BlackArch Linux Tools List

BlackArch Linux Logo 

Every package of the BlackArch Linux repository is listed in the following table. If you don’t find your needed tool in this list simply open an issue or better do a pull request for the tool you want to be in our repository. We are fast by packaging and releasing tools.
Tool count: 1337

BlackArch Linux Complete Tools List
Name Version Description Homepage
0d1n 168.f4c8366 Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.
0trace 1.5 A hop enumeration tool
3proxy Tiny free proxy server.
3proxy-win32 Tiny free proxy server.
42zip 42 Recursive Zip archive bomb.
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol.
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface
admid-pack 0.1 ADM DNS spoofing tools – Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
admsnmp 0.1 ADM SNMP audit scanner.
aesfix 1.0.1 A tool to find AES key in RAM
aeskeyfind 1.0 A tool to find AES key in RAM
aespipe 2.4d Reads data from stdin and outputs encrypted or decrypted results to stdout.
aesshell 0.7 A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.
afflib 3.7.4 An extensible open format for the storage of disk images and related forensic information.
afl 1.96b Security-oriented fuzzer using compile-time instrumentation and genetic algorithms
afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP)
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
aiengine 445.09c285f A packet inspection engine with capabilities of learning without any human intervention.
aimage 3.2.5 A program to create aff-images.
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images.
aircrack-ng 1.2rc3 Key cracker for the 802.11 WEP and WPA-PSK protocols
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.
airgraph-ng 2371 Graphing tool for the aircrack suite
airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools.
airpwn 1.4 A tool for generic packet injection on an 802.11 network.
albatar 6.207f7e2 A SQLi exploitation framework in Python.
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications.
androguard 786.309aa68 Reverse engineering, Malware and goodware analysis of Android applications and more.
androick 5.35048d7 A python tool to help in forensics analysis on android.
android-apktool 2.0.2 A tool for reengineering Android apk files.
android-ndk r9c Android C/C++ developer kit.
android-sdk-platform-tools r23.0.1 Platform-Tools for Google Android SDK (adb and fastboot).
android-sdk r24.4.1 Google Android SDK.
android-udev-rules 179.b22717d Android udev rules.
androidpincrack 2.ddaf307 Bruteforce the Android Passcode given the hash and salt.
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.
anontwi 1.1b A free software python client designed to navigate anonymously on social networks. It supports and
apache-users 2.1 This perl script will enumerate the usernames on a unix system that use the apache module UserDir.
aphopper 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks.
api-dnsdumpster 24.310488c Unofficial Python API for
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.
arachni 1.3.2 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.
aranea 6.469b9ee A fast and clean dns spoofing tool.
arduino 1.0.5 Arduino SDK (includes patched avrdude and librxtx)
argus Network monitoring tool with flow control.
argus-clients 3.0.8 Network monitoring client for Argus.
armitage 150813 A graphical cyber attack management tool for Metasploit.
armscgen 71.0159df8 ARM Shellcode Generator (Mostly Thumb Mode).
arp-scan 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network
arpalert 2.0.12 Monitor ARP changes in ethernet networks.
arpoison 0.7 The UNIX arp cache update utility
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.
arpwner 26.f300fdf GUI-based python tool for arp posioning and dns poisoning attacks.
artillery 142.dffe6d3 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.
asleap 2.2 Actively recover LEAP/PPTP passwords.
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner.
atftp 0.7.1 client/server implementation of the TFTP protocol that implements RFCs 1350, 2090, 2347, 2348, and 2349
athena-ssl-scanner 0.6.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.
atscan 79.c5583b8 Server, Site and Dork Scanner.
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.
auto-xor-decryptor 5.1f552be Automatic XOR decryptor tool.
autopsy 2.24 A GUI for The Sleuth Kit.
autopwn 177.2f3f605 Specify targets and run sets of tools against them.
azazel 12.16ca8ac A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.
b2sum 27.1c2b66c BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.
backcookie 45.35fb0a3 Small backdoor using cookie.
backdoor-factory 157.a0e6025 Patch win32/64 binaries with shellcode.
backdoorme 46.9563e69 A powerful utility capable of backdooring Unix machines with a slew of backdoors.
backfuzz 36.8e54ed6 A network protocol fuzzing toolkit.
balbuzard 67.d6349ef1bc55 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).
bamf-framework 35.30d2b4b A modular framework designed to be a platform to launch attacks against botnets.
base64dump 0.0.3 Extract and decode base64 strings from files.
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
batctl 2015.1 B.A.T.M.A.N. advanced control and management tool.
batman-adv 2015.1 Batman kernel module, (included upstream since .38)
batman-alfred 2015.1 Almighty Lightweight Fact Remote Exchange Daemon
bbqsql 259.4f7c086 SQL injection exploit tool.
bbscan 9.655a258 A tiny Batch weB vulnerability Scanner.
bdfproxy 83.0adbc0a Patch Binaries via MITM: BackdoorFactory + mitmProxy
bdlogparser 1 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
beef The Browser Exploitation Framework that focuses on the web browser
beeswarm 1154.29273e6 Honeypot deployment made easy
beholder 0.8.10 A wireless intrusion detection tool that looks for anomalies in a wifi environment.
beleth 36.0963699 A Multi-threaded Dictionary based SSH cracker.
bettercap 303.00e7aaa A complete, modular, portable and easily extensible MITM framework.
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
bgp-md5crack 0.1 RFC2385 password cracker
binaryninja-python 10.89d63f1 Binary Ninja prototype written in Python.
bind-tools 9.10.3.P2 The ISC DNS tools
bindead 4504.67019b9 A static analysis tool for binaries
binex 1.0 Format String exploit building tool.
binflow 4.c4140d7 POSIX function tracing. Much better and faster than ftrace.
bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address.
bing-lfi-rfi 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.
binwalk 2.0.1 A tool for searching a given binary image for embedded files.
binwally 4.0aabd8b Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).
bios_memimage 1.2 A tool to dump RAM contents to disk (aka cold boot attack).
birp 60.1d7c49f A tool that will assist in the security assessment of mainframe applications served over TN3270.
bittwist 2.0 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.
bkhive 1.1.1 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.
blackarch-menus 0.2 BlackArch specific XDG-compliant menu
blackarch-mirrorlist 20150529 BlackArch Project mirrorlist for use by pacman
blackhash 0.2 Creates a filter from system hashes
bletchley 0.0.1 A collection of practical application cryptanalysis tools.
blindelephant 7 A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations
blindsql 1.0 Set of bash scripts for blind SQL injection attacks
bluebox-ng 0.1.8 A GPL VoIP/UC vulnerability scanner.
bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt.
bluelog 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.
bluepot 0.1 A Bluetooth Honeypot written in Java, it runs on Linux
blueprint 0.1_3 A perl tool to identify Bluetooth devices.
blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios.
bluescan 1.0.6 A Bluetooth Device Scanner.
bluesnarfer 0.1 A bluetooth attacking tool
bluto 67.54b14ce Recon, Subdomain Bruting, Zone Transfers.
bmap-tools 3.2 Tool for copying largely sparse files using information from a block map file.
bob-the-butcher 0.7.1 A distributed password cracker package.
bokken 452.c6a2831bd48f GUI for radare2 and pyew.
bowcaster 172.a2b084f A framework intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.
braa 0.82 A mass snmp scanner
braces 0.4 A Bluetooth Tracking Utility.
bro 2.4.1 A powerful network analysis framework that is much different from the typical IDS you may know.
browser-fuzzer 3 Browser Fuzzer 3
brutessh 0.6 A simple sshd password bruteforcer using a wordlist, it’s very fast for internal networks. It’s multithreads.
brutex 32.0420df0 Automatically brute force all services running on a target.
brutus 2 One of the fastest, most flexible remote password crackers you can get your hands on.
bsdiff 4.3 bsdiff and bspatch are tools for building and applying patches to binary files.
bsqlbf 2.7 Blind SQL Injection Brute Forcer.
bss 0.8 Bluetooth stack smasher / fuzzer
bt_audit 0.1.1 Bluetooth audit
btcrack 1.1 The world’s first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.
btscanner 2.1 Bluetooth device scanner.
bulk-extractor 1.5.5 Bulk Email and URL extraction tool.
bully 21.388df45 A wifi-protected-setup (WPS) brute force attack tool.
bunny 0.93 A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.
burpsuite 1.6.31 An integrated platform for attacking web applications (free edition).
buttinsky 138.1a2a1b2 Provide an open source framework for automated botnet monitoring.
bvi 1.4.0 A display-oriented editor for binary files operate like “vi” editor.
bytecode-viewer 192.54e96d9 A Java 8/Android APK Reverse Engineering Suite.
cadaver 0.23.3 Command-line WebDAV client for Unix
camscan 1.0057215 A tool which will analyze the CAM table of Cisco switches to look for anamolies.
canari 1.1 A transform framework for maltego
cangibrina 104.43e2048 Dashboard Finder.
cansina 133.e7deee9 A python-based Web Content Discovery Tool.
capstone 3.0.4 A lightweight multi-platform, multi-architecture disassembly framework
captipper 66.98d63eb Malicious HTTP traffic explorer tool.
carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
casefile 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information
cdpsnarf 0.1.6 Cisco discovery protocol sniffer.
cecster 5.15544cb A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols.
centry 72.6de2868 Cold boot & DMA protection
cewl 5.1 A custom word list generator
cflow 1.4 A C program flow analyzer.
chaosmap 1.3 An information gathering tool and dns / whois / web server scanner
chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.
chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes.
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker.
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN).
checkpwd 1.23 Oracle Password Checker (Cracker).
checksec 1.5 Tool designed to test which standard Linux OS and PaX security features are being used
cheetah 21.2364713 Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.)
chiron 0.8.1 An all-in-one IPv6 Penetration Testing Framework.
chkrootkit 0.50 Checks for rootkits on a system
chntpw 140201 Offline NT Password Editor – reset passwords in a Windows NT SAM user database file
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords.
chromefreak 24.12745b1 A Cross-Platform Forensic Framework for Google Chrome
chw00t 31.19a0726 Unices chroot breaking tool.
cidr2range 0.9 Script for listing the IP addresses contained in a CIDR netblock
cintruder 0.2.0 An automatic pentesting tool to bypass captchas.
cipherscan 352.18b0d1b A very simple way to find out which SSL ciphersuites are supported by a target.
ciphertest 20.3224858 A better SSL cipher checker using gnutls.
ciphr 105.db79691 A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer.
cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
cisco-ocs 0.2 Cisco Router Default Password Scanner.
cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris.
cisco-snmp-enumeration 10.ad06f57 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.
cisco-snmp-slap 5.daf0589 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool.
cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords.
cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords.
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
clamscanlogparser 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
climber 23.f614304 Check UNIX/Linux systems for privilege escalation.
cloudflare-enum 9.c1d8fca Cloudflare DNS Enumeration Tool for Pentesters.
cloudget 53.807d08e Python script to bypass cloudflare from command line. Built upon cfscrape module.
clusterd 143.d190b2c Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.
cmospwd 5.0 Decrypts password stored in CMOS used to access BIOS setup.
cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running
cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.
cmsfuzz 5.6be5a98 Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke.
cmsmap 3.37b64be A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.
codetective 39.7f44df4 A tool to determine the crypto/encoding algorithm used according to traces of its representation.
commix 356.61c9f99 Automated All-in-One OS Command Injection and Exploitation Tool.
complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever
configpush 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.
conpot 0.4.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url=””
conscan 1.2 A blackbox vulnerability scanner for the Concre5 CMS.
cookie-cadger 1.08 An auditing tool for Wi-Fi or wired Ethernet connections.
corkscrew 2.0 A tool for tunneling SSH through HTTP proxies
cowpatty 4.6 Wireless WPA/WPA2 PSK handshake cracking utility
cpfinder 0.1 This is a simple script that looks for administrative web interfaces.
cppcheck 1.71 A tool for static C/C++ code analysis
cpptest 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.
crackhor 2.ae7d83f A Password cracking utility.
crackle 50.1552507 Crack and decrypt BLE encryption
crackmapexec 162.9f13088 A swiss army knife for pentesting Windows/Active Directory environments.
crackq 47.c5b8c5e GPU-accelerated password cracker.
crackserver 33.e5763ab An XMLRPC server for password cracking.
create_ap 189.000f6a2 This script creates a NATed or Bridged WiFi Access Point.
creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives.
credmap 59.0456a8d The Credential mapper – Tool that was created to bring awareness to the dangers of credential reuse.
creds 17.1ec8297 Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.
creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.
crowbar 51.640779a A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set.
crypthook 17.0728cd1 TCP/UDP symmetric encryption tunnel wrapper.
cryptonark 0.5.6 SSL security checker.
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
ctunnel 0.7 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
cuckoo 1.2 A malware analysis system.
cudahashcat 1.37 Worlds fastest WPA cracker with dictionary mutation engine.
cupp 3.0 Common User Password Profiler
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit’s rendering of a web page.
cvechecker 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.
cymothoa 1 A stealth backdooring tool, that inject backdoor’s shellcode into an existing process.
damm 30.5aa2a1e Differential Analysis of Malware in Memory.
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
darkjumper 5.8 This tool will try to find every website that host at the same server at your target
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool
darkstat 3.0.719 Network statistics gatherer (packet sniffer)
dartspylru 7.5ef01b1 Simple dictionary with LRU behaviour.
davoset 1.2.7 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.
davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target
dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines
dc3dd 7.2.641 A patched version of dd that includes a number of features useful for computer forensics.
dcfldd DCFL (DoD Computer Forensics Lab) dd replacement with hashing
ddrescue 1.20 GNU data recovery tool
deblaze 0.3 A remote method enumeration tool for flex servers
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer.
delorean 7.68139d1 NTP Main-in-the-Middle tool.
depant 0.3a Check network for services with default passwords.
depdep 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network.
detect-it-easy 42.6af9ca6 A program for determining types of files.
device-pharmer 37.e0e6281 Opens 1K+ IPs or Shodan search results and attempts to login.
dex2jar 2.0 A tool for converting Android’s .dex format to Java’s .class format
dff-scanner 1.1 Tool for finding path of predictable resource locations.
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow.
dhcpf 2.96bc8a9 Passive DHCP fingerprinting implementation.
dhcpig 69.cc4109a Enumerates hosts, subdomains, and emails from a given domain using google
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC
dirb 2.22 A web content scanner, brute forceing for hidden files.
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers
dirbuster-ng 9.0c34920 C CLI implementation of the Java dirbuster tool.
directorytraversalscan Detect directory traversal vulnerabilities in HTTP servers and web applications.
dirs3arch 136.94068b8 HTTP(S) directory/file brute forcer.
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more.
dislocker 0.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.
dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.
dissy 10 A graphical frontend to the objdump disassembler for compiler-generated code.
dizzy 0.8.2 A Python based fuzzing framework with many features.
dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.
dnmap 0.6 The distributed nmap framework
dns-reverse-proxy 15.7fb76f5 A reverse DNS proxy written in Go.
dns-spoof 12.3918a10 Yet another DNS spoof utility.
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains.
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS.
dnsa 0.5 DNSA is a dns security swiss army knife
dnsbf 0.3 Search for available domain names in an IP range.
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
dnschef 0.3 A highly configurable DNS proxy for pentesters.
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS.
dnsenum Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.
dnsmap 0.30 Passive DNS network mapper
dnspredict 0.0.2 DNS prediction
dnsrecon 0.8.9 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
dnsspider 0.7 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
dnsteal 20.e3f92fe DNS Exfiltration tool for stealthily sending files over DNS requests..
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
dnstwist 132.26dbe53 Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
dnswalk 2.0.2 A DNS debugger
domain-analyzer 0.8.1 Finds all the security information for a given domain name.
doona 132.1a4d409 A fork of the Bruteforce Exploit Detector Tool (BED).
doozer 9.5cfc8f8 A Password cracking utility.
dotdotpwn 3.0 The Transversal Directory Fuzzer
dpeparser beta002 Default password enumeration project
dpscan 0.1 Drupal Vulnerabilty Scanner.
dradis 2.9.0 An open source framework to enable effective information sharing.
dragon-backdoor 7.c7416b7 A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c.
driftnet 1.1.5 Listens to network traffic and picks out images from TCP streams it observes.
dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.
droopescan 1.33.1 A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.
dscanner 768.c5392e7 Swiss-army knife for D source code.
dsd 91.7ee04e5 Digital Speech Decoder
dsniff 2.4b1 Collection of tools for network auditing and penetration testing
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS.
dump1090 386.bff92c4 A simple Mode S decoder for RTLSDR devices.
dumpacl 0.0 Dumps NTs ACLs and audit settings.
dumpzilla 03152013 A forensic tool for firefox.
dvcs-ripper 44.a9d3afe Rip web accessible (distributed) version control systems: SVN/GIT/…
eapeak 91.2afd560 Analysis Suite For EAP Enabled Wireless Networks.
eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials.
easyda 7.0867f9b Easy Windows Domain Access Script.
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant).
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.
ecfs 229.faf2fc2 Extended core file snapshot format.
edb 0.9.20 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.
eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes)
elettra 1.0 Encryption utility by Julia Identity
elettra-gui 1.0 Gui for the elettra crypto application.
elite-proxy-finder 49.589a76d Finds public elite anonymity proxies and concurrently tests them.
enabler 1 Attempts to find the enable password on a cisco system via brute force.
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
ent 1.0 Pseudorandom number sequence test.
enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account.
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems.
enumiax 1.0 An IAX enumerator.
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6.
epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
erase-registrations 1.0 An IAX flooder.
etherape 0.9.13 A graphical network monitor for various OSI layers and protocols
ettercap 0.8.2 A network sniffer/interceptor/logger for ethernet LANs – console
evilgrade 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password
exabgp 3133.ccd9a4a The BGP swiss army knife of networking.
exiv2 0.25 Exif, Iptc and XMP metadata manipulation library and tools
expimp-lookup 4.79a96c7 Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software – A collection of hacks
extracthosts 14.ec8b89c Extracts hosts (IP/Hostnames) from files.
extundelete 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability
eyewitness 468.6c73ef4 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
facebot 23.57f6025 A facebook profile and reconnaissance system.
facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).
fakeap 0.3.2 Black Alchemy’s Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP’s cacophony of beacon frames.
fakedns 42.b67ecab A regular-expression based python MITM DNS server with correct DNS request passthrough and “Not Found” responses.
fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing.
fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.
fang 20.4b176f3 A multi service threaded MD5 cracker.
faraday 1956.8211936 A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.
fbht 68.1ffc236 A Facebook Hacking Tool
fbid 11.b8106f8 Show info about the author by facebook photo url.
fcrackzip 1.0 Zip file password cracker
fern-wifi-cracker 222 WEP, WPA wifi cracker for wireless penetration testing
fernmelder 6.c6d4ebe Asynchronous mass DNS scanner.
fgscanner 11.893372c An advanced, opensource URL scanner.
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.
fierce 0.9.9 A DNS scanner
fiked 0.0.5 Fake IDE daemon
filibuster 161.37b7f9c A Egress filter mapping application with additional functionality.
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation
find-dns 0.1 A tool that scans networks looking for DNS servers.
findmyhash 1.1.2 Crack different types of hashes using free online services
firewalk 5.0 An active reconnaissance network security tool
firmware-mod-kit 099 Modify firmware images without recompiling.
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points.
fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks.
flare 0.6 Flare processes an SWF and extracts all scripts from it.
flashlight 103.f228b63 Automated Information Gathering Tool for Penetration Testers.
flasm 1.62 Disassembler tool for SWF bytecode
flawfinder 1.31 Searches through source code for potential security flaws.
flowinspect 96.1f62b3b A network traffic inspection tool.
flunym0us 2.0 A Vulnerability Scanner for WordPress and Moodle.
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures
forkingportscanner 1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.
fpdns 20130404 Program that remotely determines DNS server versions.
fping 3.10 A utility to ping multiple hosts at once
fport 2.0 Identify unknown open ports and their associated applications.
fprotlogparser 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.
fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6.
freeipmi 1.4.11 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).
freeradius 3.0.10 The premier open source RADIUS server
frisbeelite 1.2 A GUI-based USB device fuzzer.
fs-exploit 3.28bb9bb Format string exploit generation.
fs-nyarl 1.0 A network takeover & forensic analysis tool – useful to advanced PenTest tasks & for fun and profit.
fsnoop 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called “payload modules” or “paymods”).
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.
ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server sofware.
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris.
ftp-spider 1.0 FTP investigation tool – Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.
ftpmap 52.cbeabbe Scans remote FTP servers to identify what software and what versions they are running.
fusil 1.5 A Python library used to write fuzzing programs.
fuzzap 14.f13932c A python script for obfuscating wireless networks.
fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.
fuzzdb 184.3a35bfd Attack and Discovery Pattern Database for Application Fuzz Testing
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively ‘un-fuzzes’ portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.
fuzztalk An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.
g72x++ 1 Decoder for the g72x++ codec.
galleta 20040505_1 Examine the contents of the IE’s cookie files for forensic purposes
gdb 7.10.1 The GNU Debugger
genlist 0.1 Generates lists of IP addresses.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
geoip 1.6.6 Non-DNS IP-to-country resolver C library & utils
geoipgen 0.4 GeoIPgen is a country to IP addresses generator.
gerix-wifi-cracker 1.1c3cd73 A graphical user interface for aircrack-ng and pyrit.
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’.
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.
ghettotooth 1.0 Ghettodriving for bluetooth
ghost-phisher 1.62 GUI suite for phishing and penetration attacks
ghost-py 0.2.3 Webkit based webclient (relies on PyQT).
giskismet 20110805 A program to visually represent the Kismet data in a flexible manner.
githack 5.9119d57 A `.git` folder disclosure exploit.
gitrob 0.0.6 Scan Github For Sensitive Files.
gnuradio General purpose DSP and SDR toolkit. With drivers for usrp and fcd.
gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2)
gobd 81.e64b5a5 A Golang covert backdoor.
goldeneye 16.7a38fe9 A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.
golismero 35.36ed3d4 Opensource web security testing framework.
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
goofile 1.5 Command line filetype search
goog-mail 1.0 Enumerate domain emails from google.
googlesub 1.3 A python script to find domains by using google dorks.
gooscan 1.0.9 A tool that automates queries against Google search appliances, but with a twist.,doc_details&Itemid=/gid,28/
gpredict 1.3 A real-time satellite tracking and orbit prediction application.
gqrx 2.4 Interactive SDR receiver waterfall for many devices.
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website.
greenbone-security-assistant 6.0.6 Greenbone Security Assistant (gsa) – OpenVAS web frontend
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts.
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.
guymager 0.7.4 A forensic imager for media acquisition.
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet.
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls.
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.
haka 0.2.2 A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files.
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository.
hamster 2.0.0 Tool for HTTP session sidejacking.
handle 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..
hasere 1.0 Discover the vhosts using google and bing.
hashcat 2.00 A multithreaded cross platform hash cracker.
hashcat-utils 1.2 Utilites for Hashcat
hashdeep 4.4 Advanced checksum hashing tool.
hasher 48.40173c5 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.
hashfind 8.e9a9a14 A tool to search files for matching password hash types and other interesting data.
hashid 397.7e8473a Software to identify the different types of hashes used to encrypt data.
hashpump 45.2d01d3b A tool to exploit the hash length extension attack in various hashing algorithms.
hashtag 0.41 A python script written to parse and identify password hashes.
haystack 1625.e2f1fbe A Python framework for finding C structures from process memory – heap analysis – Memory structures forensics.
hbad 1.0 This tool allows you to test clients on the heartbleed bug.
hcraft 1.0.0 HTTP Vuln Request Crafter
hdcp-genkey 18.e8d342d Generate HDCP source and sink keys from the leaked master key.
hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford’s
hemingway 6.d4ec5f1 A simple and easy to use spear phishing helper.
hex2bin 2.1 Converts Motorola and Intel hex files to binary.
hexinject 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access.
hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).
hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.
hidattack 0.1 HID Attack (attacking HID host implementations)
honeyd 1.6.7 A small daemon that creates virtual hosts on a network.
honggfuzz 0.6 A general-purpose fuzzer with simple, command-line interface.
honssh 60.86d06f9 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.
hookanalyser 3.1 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
hoover 4.9bda860 Wireless Probe Requests Sniffer.
hoppy 1.8.1 A python script which tests http methods for configuration issues leaking information or just to see if they are enabled.
host-extract 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.
hostapd-wpe 2.2 IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator – Wireless Pwnage Edition.
hostbox-ssh 0.1.1 A ssh password/account scanner.
hotpatch 0.2 Hot patches executables on Linux using .so file injection.
hotspotter 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.
hpfeeds 164.f18712d Honeynet Project generic authenticated datafeed protocol.
hping 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer.
hqlmap 38.bb6ab46 A tool to exploit HQL Injections.
hsecscan 35.fa49c35 A security scanner for HTTP response headers.
htcap 2.bbbeee1 A web application analysis tool for detecting communications between javascript and the server.
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process
htpwdscan 16.99697fc A python HTTP weak pass scanner.
htrosbif 134.9dc3f86 Active HTTP server fingerprinting and recon tool.
htshells 79.399feaa Self contained web shells and other attacks via .htaccess files.
http-enum 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver.
http-fuzz 0.1 A simple http fuzzer. none
http-put 1.0 Simple http put perl script
http-traceroute 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.
httpbog A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.
httpforge 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.
httping 2.4 A ‘ping’-like tool for http-requests.
httprint 301 A web server fingerprinting tool.
httprint-win32 301 A web server fingerprinting tool (Windows binaries).
httpry 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic.
httpsniff 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.
httpsscanner 1.2 A tool to test the strength of a SSL web server.
httptunnel 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests
httrack 3.48.21 An easy-to-use offline browser utility.
hubbit-sniffer 69.4ef732f Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api.
hulk 11.a9b9ad4 A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.
hungry-interceptor 111.9167162 Intercepts data, does something with it, stores it.
hwk 0.4 Collection of packet crafting and wireless network flooding tools
hyde 5.22d8e91 Just another tool in C to do DDoS (with spoofing).
hydra 8.1 A very fast network logon cracker which support many different services
hyenae 0.36_1 flexible platform independent packet generator
hyperfox 45.79ffeb5 A security tool for proxying and recording HTTP and HTTPs traffic.
hyperion 1.2 A runtime encrypter for 32-bit portable executables.
iaxflood 0.1 IAX flooder.
iaxscan 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.
ibrute 12.3a6a11e An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.
icmpquery 1.0 Send and receive ICMP queries for address mask and current time.
icmptx 0.2 IP over ICMP tunnel.
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems.
ifchk 1.0.1 A network interface promiscuous mode detection tool.
iheartxor 0.01 A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
iis-shortname-scanner 4.b92772a An IIS shortname Scanner.
iisbruteforcer 15 HTTP authentication cracker. It’s a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server.
ike-scan 1.9 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers
ikecrack 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication
ikeprobe 0.1 Determine vulnerabilities in the PSK implementation of the VPN server.
ikeprober 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors
ilty 1.0 An interception phone system for VoIP network.
imagejs 48.1faf262 Small tool to package javascript into a valid image file.
inception 431.34f207d A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.
indxparse 166.14839a6 A Tool suite for inspecting NTFS artifacts.
inetsim 1.2.5 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
infip 0.1 A python script that checks output from netstat against RBLs from Spamhaus.
inguma 0.1.1 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
intercepter-ng 0.9.8 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.
interrogate 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
intersect 2.5 Post-exploitation framework
intrace 1.5 Traceroute-like application piggybacking on existing TCP connections
inundator 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
inurlbr 31.5bb8b38 Advanced search in the search engines – Inurl scanner, dorker, exploiter.
inviteflood 2.0 Flood a device with INVITE requests
iodine 0.7.0 Tunnel IPv4 data through a DNS server
iosforensic 1.0 iOS forensic tool
ip-https-tools 7.170691f Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.
ipaudit 1.0rc9 Monitors network activity on a network.
ipba2 032013 IOS Backup Analyzer
ipdecap 69.f3a08f6 Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.
iphoneanalyzer 2.1.0 Allows you to forensically examine or recover date from in iOS device.
ipscan 3.4 Angry IP scanner is a very fast IP address and port scanner.
iputils 20140519.fad11dc Network monitoring tools, including ping
ipv6toolkit 2.0 SI6 Networks’ IPv6 Toolkit
ircsnapshot 94.cb02a85 Tool to gather information from IRC servers.
irpas 0.10 Internetwork Routing Protocol Attack Suite.
isip 2.fad1f10 Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.
isme 0.12 Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN.
isr-form 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.
ivre 748.cb10ba2 Network recon framework.
jad 1.5.8e Java decompiler
jaidam 10.a7d7c4a Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan.
javasnoop 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer
jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access.
jbrofuzz 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing.
jbrute 0.99 Open Source Security tool to audit hashed passwords.
jd-gui 1.4.0 A standalone graphical utility that displays Java source codes of .class files.
jhead 3.00 EXIF JPEG info parser and thumbnail remover
jigsaw 1.3 A simple ruby script for enumerating information about a company’s employees. It is useful for Social Engineering or Email Phishing.
jnetmap 0.5.3 A network monitor of sorts
john 1.7.9 John The Ripper – A fast password cracker (jumbo included)
johnny 20120424 GUI for John the Ripper.
jomplug 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm’s archive to check for bugs related to the installed components.
jooforce 11.43c21ad A Joomla password brute force tester.
joomlascan 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files.
joomlavs 197.3e217d5 A black box, Ruby powered, Joomla vulnerability scanner.
joomscan 2012.03.10 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
js-beautify 1.5.10 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by
jsql 0.6 A lightweight application used to find database information from a distant server.
junkie 1365.70a83d6 A modular packet sniffer and analyzer.
jwscan 6.b0306f0 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.
jynx2 2.0 An expansion of the original Jynx LD_PRELOAD rootkit
kacak 1.0 Tools for penetration testers that can enumerate which users logged on windows system.
kadimus 43.bbb1f2f LFI Scan & Exploit Tool.
kalibrate-rtl 11.aae11c8 Fork of for use with rtl-sdr devices.
katana A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others).
katsnoop 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.
kautilya 0.5.5 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.
keimpx 165.aab7213 Tool to verify the usefulness of credentials across a network over SMB.
khc 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.
killerbee 99 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
kippo 0.9 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.
kismet 2013_03_R1b 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
kismet-earth 0.1 Various scripts to convert kismet logs to kml file to be used in Google Earth. http://
kismet2earth 1.0 A set of utilities that convert from Kismet logs to Google Earth .kml format
klogger 1.0 A keystroke logger for the NT-series of Windows.
knock 221.64cacf8 Subdomain scanner.
kolkata 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.
kraken 32.368a837 A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.
laf 12.7a456b3 Login Area Finder: scans host/s for login panels.
lanmap2 127.1197999 Passive network mapping tool.
lans 167.62d60c2 A Multithreaded asynchronous packet parsing/injecting arp spoofer.
latd 1.31 A LAT terminal daemon for Linux and BSD.
laudanum 1.0 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
lbd 20130719 Load Balancing detector
lbmap 145.93e6b71 Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.
ldap-brute 21.acc06e3 A semi fast tool to bruteforce values of LDAP injections over HTTP.
ldapenum 0.1 Enumerate domain controllers using LDAP.
leo 5.1 Literate programmer’s editor, outliner, and project manager.
leroy-jenkins 3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
letmefuckit-scanner 3.f3be22b Scanner and Exploit Magento.
levye 84.5406303 A brute force tool which is support sshkey, vnckey, rdp, openvpn.
lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI
lfi-exploiter 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..
lfi-fuzzploit 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.
lfi-image-helper 0.8 A simple script to infect images with PHP Backdoors for local file inclusion attacks.
lfi-scanner 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target.
lfi-sploiter 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.
lfifreak 21.0c6adef A unique automated LFi Exploiter with Bind/Reverse Shells.
lfimap 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver.
lft 3.73 A layer four traceroute implementing numerous other features.
libdisasm 0.23 A disassembler library.
libpst 0.6.63 Outlook .pst file converter
liffy 65.8011cdd A Local File Inclusion Exploitation tool.
linenum 18.b4c2541 Scripted Local Linux Enumeration & Privilege Escalation Checks
linset 9.8746b1f Evil Twin Attack Bash script – An automated WPA/WPA2 hacker.
linux-exploit-suggester 32.9db2f5a A Perl script that tries to suggest exploits based OS version number. 28.5b3156b An Exploit Dev Swiss Army Knife.
list-urls 0.1 Extracts links from webpage
littleblackbox 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.
lldb 3.7.0 Next generation, high-performance debugger
lodowep 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
logkeys 0.1.1a Simple keylogger supporting also USB keyboards.
loot 51.656fb85 Sensitive information extraction tool.
lorcon Generic library for injecting 802.11 frames
lotophagi 0.1 a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.
lsrtunnel 0.2 Spoofs connections using source routed packets.
lte-cell-scanner 57.5fa3df8 LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).
luksipc 0.01 A tool to convert unencrypted block devices to encrypted LUKS devices in-place.
luyten 0.4.4 An Open Source Java Decompiler Gui for Procyon.
lynis 2.1.1 Security and system auditing tool to harden Unix/Linux systems
mac-robber 1.02 A digital investigation tool that collects data from allocated files in a mounted file system.
macchanger 1.7.0 A small utility to change your NIC’s MAC address
maclookup 0.4 Lookup MAC addresses in the IEEE MA-L/OUI public listing.
magicrescue 1.1.9 Find and recover deleted files on block devices
magictree 1.3 A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation
make-pdf 0.1.6 This tool will embed javascript inside a PDF document.
makepasswd 1.10_10 Generates true random passwords with the emphasis on security over pronounceability (Debian version)
malcom 704.ec915a3 Analyze a system’s network communication using graphical representations of network traffic.
malheur 0.5.4 A tool for the automatic analyze of malware behavior.
maligno 2.4 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS.
malmon 0.3 Hosting exploit/backdoor detection daemon. It’s written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.
maltego An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
maltrieve 342.b9e7560 Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.
malware-check-tool 1.2 Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.
malwareanalyser 3.3 A freeware tool to perform static and dynamic analysis on malware.
malwaredetect 0.1 Submits a file’s SHA1 sum to VirusTotal to determine whether it is a known piece of malware
malwasm 0.2 Offline debugger for malware’s reverse engineering.
malybuzz 1.0 A Python tool focused in discovering programming faults in network software.
mana 68.56bcfcd A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.
marc4dasm 6.f11860f This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).
maskprocessor 0.73 A High-Performance word generator with a per-position configurable charset.
masscan 1.0.3 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes
masscan-automation 24.2df3467 Masscan integrated with Shodan API.
mat 0.5.4 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
matahari 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls.
mausezahn 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
mbenum 1.5.0 Queries the master browser for whatever information it has registered.
mboxgrep 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
mdbtools 0.7.1 Utilities for viewing data and exporting schema from Microsoft Access Database files
mdcrack 1.2 MD4/MD5/NTLM1 hash cracker
mdk3 v6 WLAN penetration tool
mdns-recon 6.2d6b5e3 An mDNS recon tool written in Python.
mdns-scan 0.5 Scan mDNS/DNS-SD published services on the local network.
medusa 2.2 Speedy, massively parallel and modular login brute-forcer for network
melkor 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).
memdump 1.01 Dumps system memory to stdout, skipping over holes in memory maps.
memfetch 0.05b Dumps any userspace process memory without affecting its execution.
metacoretex 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents
metasploit 36655.726578b An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.
meterssh 10.ebb6f4e A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.
metoscan 05 Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.
mfcuk 0.3.8 MIFARE Classic Universal toolKit
mfoc 0.10.7 Mifare Classic Offline Cracker
mfsniffer 0.1 A python script for capturing unencrypted TSO login credentials.
mibble 2.9.3 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks.
mikrotik-npk 11.d54e97c Python tools for manipulating Mikrotik NPK format.
minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
miredo 1.2.6 Teredo client and server.
missidentify 1.0 A program to find Win32 applications.
missionplanner 1.2.55 A GroundControl Station for Ardupilot.
mitmap 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.
mitmer 22.b01c7fe A man-in-the-middle and phishing attack tool that steals the victim’s credentials of some web services like Facebook.
mitmf 425.d542dc1 A Framework for Man-In-The-Middle attacks written in Python.
mitmproxy 0.15 SSL-capable man-in-the-middle HTTP proxy
mkbrutus 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS.
mobiusft 0.5.21 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.
modscan 0.1 A new tool designed to map a SCADA MODBUS TCP based network.
moloch 0.11.2 An open source large scale IPv4 full PCAP capturing, indexing and database system.
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
morxbook 1.0 A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.
morxbrute 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl
morxbtcrack 1.0 Single Bitcoin private key cracking tool released.
morxcoinpwn 1.0 Mass Bitcoin private keys brute forcing/Take over tool released.
morxcrack 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.
morxkeyfmt 1.0 Read a private key from stdin and output formatted data values.
morxtraversal 1.0 Path Traversal checking tool.
morxtunnel 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool.
mosca 50.9247e5a Static analysis tool to find bugs like a grep unix command.
mots 5.34017ca Man on the Side Attack – experimental packet injection and detection.
mp3nema 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as “out of band” data.
mptcp 1.9.0 A tool for manipulation of raw packets that allows a large number of options.
mptcp-abuse 6.b0eeb27 A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.
mrtparse 383.0ee0201 A module to read and analyze the MRT format data.
ms-sys 2.5.1 A tool to write Win9x-.. master boot records (mbr) under linux – RTM!
mssqlscan 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers.
msvpwn 65.328921b Bypass Windows’ authentication via binary patching.
mtr 0.86 Combines the functionality of traceroute and ping into one tool (CLI version)
multiinjector 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
multimac 1.0.3 Multiple MACs on an adapter
multimon-ng 20151109 An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei.
multitun 43.9804513 Tunnel arbitrary traffic through an innocuous WebSocket.
mutator 51.164132d This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012
mwebfp 16.a800b98 Mass Web Fingerprinter.
mysql2sqlite 14.e5b2c31 Converts a mysqldump file into a Sqlite 3 compatible file.
nacker 23.b67bb39 A tool to circumvent 802.1x Network Access Control on a wired LAN.
nbnspoof 1.0 NBNSpoof – NetBIOS Name Service Spoofer
nbtenum 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.
nbtool 2.bf90c76 Some tools for NetBIOS and DNS investigation, attacks, and communication.
nbtscan 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information.
ncpfs 2.2.6 Allows you to mount volumes of NetWare servers under Linux.
ncrack 0.4a A high-speed network authentication cracking tool
necromant 3.acbc448 Python Script that search unused Virtual Hosts in Web Servers.
neglected 8.68d02b3 Facebook CDN Photo Resolver.
neighbor-cache-fingerprinter 83.f1e596f An ARP based Operating System version scanner.
nemesis 1.4 command-line network packet crafting and injection utility
net-creds 58.30b16c0 Sniffs sensitive data from interface or pcap.
netbios-share-scanner 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources.
netcommander 1.3 An easy-to-use arp spoofing tool.
netcon 0.1 A network connection establishment and management script.
netdiscover 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
netmap 0.1.3 Can be used to make a graphical representation of the surounding network.
netmask 2.4.3 Helps determine network masks
netreconn 1.78 A collection of network scan/recon tools that are relatively small compared to their larger cousins.
netscan 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).
netsed 1.2 Small and handful utility design to alter the contents of packets forwarded thru network in real time.
netsniff-ng 0.6.0 A high performance Linux network sniffer for packet inspection.
network-app-stress-tester 19.df75391 Network Application Stress Testing Yammer.
netzob 0.4.1 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.
nfcutils 0.3.2 Provides a simple ‘lsnfc’ command that list tags which are in your NFC device field
nfdump 1.6.13 A set of tools to collect and process netflow data.
nfex 2.5 A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.
nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share.
nfsshell 19980519 Userland NFS command tool.
ngrep 1.45 A grep-like utility that allows you to search for network packets on an interface.
nield 0.6.1 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.
nikto 2.1.6 A web server scanner which performs comprehensive tests against web servers for multiple items
nimbostratus 54.c7c206f Tools for fingerprintinging and exploiting Amazon cloud infrastructures.
nipper 0.11.7 Network Infrastructure Parser
nishang 0.5.0 Using PowerShell for Penetration Testing.
nkiller2 2.0 A TCP exhaustion/stressing tool.
nmap 7.01 Utility for network discovery and security auditing
nmbscan 1.2.6 Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.
nomorexor 0.1 Tool to help guess a files 256 byte XOR key by using frequency analysis
notspikefile 0.1 A Linux based file format fuzzing tool
nsdtool 0.1 A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password.
nsec3walker 20101223 Enumerates domain names using DNSSEC
nsia 1.0.6 A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.
nsoq 1.9.5 A Network Security Tool for packet manipulation that allows a large number of options.
ntds-decode 0.1 This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.
ntp-ip-enum 0.1 Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.
o-saft 854.14a2c1b A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.
oat 1.3.1 A toolkit that could be used to audit security within Oracle database servers.
obexstress 0.1 Script for testing remote OBEX service for some potential vulnerabilities.
obfsproxy 0.2.13 A pluggable transport proxy written in Python
oclhashcat 2.01 Worlds fastest WPA cracker with dictionary mutation engine.
ocs 0.2 Compact mass scanner for Cisco routers with default telnet/enable passwords.
ohrwurm 0.1 A small and simple RTP fuzzer.
oledump 0.0.17 Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.
oletools 0.41 Tools to analyze Microsoft OLE2 files.
ollydbg 201g A 32-bit assembler-level analysing debugger
onesixtyone 0.7 An SNMP scanner that sends multiple SNMP requests to multiple IP addresses
onionshare 553.41a30dd Securely and anonymously share a file of any size.
openstego 0.6.1 A tool implemented in Java for generic steganography, with support for password-based encryption of the data.
opensvp 64.56b2b8f A security tool implementing “attacks” to be able to the resistance of firewall to protocol level attack.
openvas-cli 1.4.3 The OpenVAS Command-Line Interface
openvas-libraries 8.0.5 The OpenVAS libraries
openvas-manager 6.0.6 A layer between the OpenVAS Scanner and various client applications
openvas-scanner 5.0.4 The OpenVAS scanning Daemon
ophcrack 3.6.0 A free Windows password cracker based on rainbow tables
orakelcrackert 1.00 This tool can crack passwords which are encrypted using Oracle’s latest SHA1 based password protection algorithm.
origami 1.2.7 Aims at providing a scripting tool to generate and analyze malicious PDF files.
oscanner 1.0.6 An Oracle assessment framework developed in Java.
osinterator 3.8447f58 Open Source Toolkit for Open Source Intelligence Gathering.
ostinato 0.6 An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be “Wireshark in Reverse” and thus become complementary to Wireshark.
osueta 65.90323e2 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity (“XXE”) vulnerabilities.
outguess 0.2 A universal steganographic tool.
outlook-webapp-brute 1.61d7177 Microsoft Outlook WebAPP Brute.
owabf 1.3 Outlook Web Access bruteforcer tool.
owasp-bywaf 26.e730d1b A web application penetration testing framework (WAPTF).
owtf 1017.0bbeea1 The Offensive (Web) Testing Framework.
p0f 3.08b Purely passive TCP/IP traffic fingerprinting tool
pack 0.0.4 Password Analysis and Cracking Kit
packerid 1.4 Script which uses a PEiD database to identify which packer (if any) is being used by a binary.
packet-o-matic 351 A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.
packeth 1.8.1 A Linux GUI packet generator tool for ethernet.
packetsender 92.0d8ab02 An open source utility to allow sending and receiving TCP and UDP packets.
packit 1.0 A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.
pacumen 1.92a0884 Packet Acumen – Analyse encrypted network traffic and more (side-channel attacks).
padbuster 0.3.3 Automated script for performing Padding Oracle attacks.
paketto 1.10 Advanced TCP/IP Toolkit.
panhunt 26.cd58866 Searches for credit card numbers (PANs) in directories.
panoptic 182.b5eae6b A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.
paranoic 1.7 A simple vulnerability scanner written in Perl.
paros 3.2.13 Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc.
parsero 81.e5b585a A robots.txt audit tool.
pasco 20040505_1 Examines the contents of Internet Explorer’s cache files for forensic purposes
passcracking 20131214 A little python script for sending hashes to and milw0rm
passe-partout 0.1 Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns.
passhunt 5.332f374 Search drives for documents containing passwords.
passivedns 1.1.4 A network sniffer that logs all DNS server replies for use in a passive DNS setup.
pastenum 0.4.1 Search Pastebins for content, fork from nullthreat corelan pastenum2
pasv-agrsv 51.446bed4 Passive recon / OSINT automation script.
patator 117.1a9f65e A multi-purpose bruteforcer.
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities.
pcapfix 1.1.0 Tries to repair your broken pcap and pcapng files.
pcapsipdump 0.2 A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to ‘tcpdump -w’ (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions).
pcapteller 0.2 A tool designed for traffic manipulation and replay.
pcredz 29.05ae40f A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.
pdf-parser 0.6.4 Parses a PDF document to identify the fundamental elements used in the analyzed file.
pdfbook-analyzer 2 Utility for facebook memory forensics.
pdfcrack 0.15 Password recovery tool for PDF-files.
pdfid 0.2.1 Scan a file to look for certain PDF keywords.
pdfresurrect 0.12 A tool aimed at analyzing PDF documents.
pdgmail 1.0 A password dictionary attack tool that targets windows authentication via the SMB protocol
peach 3.0.202 A SmartFuzzer that is capable of performing both generation and mutation based fuzzing.
peda 76.c9ceca7 Python Exploit Development Assistance for GDB.
peepdf 0.3 A Python tool to explore PDF files in order to find out if the file can be harmful or not
peepingtom 54.22ce8d0 A tool to take screenshots of websites. Much like eyewitness.
peframe 83.3c6165f Tool to perform static analysis on (portable executable) malware.
pemcrack 10.34b0f85 Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.
pemcracker 9.a741c93 Tool to crack encrypted PEM files.
pentbox 1.8 A security suite that packs security and stability testing oriented tools for networks and systems.
perl-tftp 1.0b3 TFTP – TFTP Client class for perl
pev 0.70 Command line based tool for PE32/PE32+ file analysis.
pextractor 0.18b A forensics tool that can extract all files from an executable file created by a joiner or similar.
pfff 0.29 Tools and APIs for code analysis, visualization and transformation
pgdbf 94.baa1d95 Convert XBase / FoxPro databases to PostgreSQL
phemail 27.7ae21f2 A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.
phoss 0.1.13 Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.
php-mt-seed 3.2 PHP mt_rand() seed cracker
php-rfi-payload-decoder 30.bd42caa Decode and analyze RFI payloads developed in PHP.
php-vulnerability-hunter An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.
phpsploit 640.420e3f7 Stealth post-exploitation framework.
phpstress 5.f987a7e A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.
phrasendrescher 1.2.2 A modular and multi processing pass phrase cracking tool
pip3line 80.2e926b0 The Swiss army knife of byte manipulation.
pipal 1.1 A password analyser
pirana 0.3.1 Exploitation framework that tests the security of a email content filter.
plcscan 0.1 This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.
plecost 86.a676971 WordPress finger printer Tool.
plown 13.ccf998c A security scanner for Plone CMS.
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
pnscan 1.11 A parallel network scanner that can be used to survey TCP network services.
poison 1.5.41 A fast, asynchronous syn and udp scanner.
pompem 85.a2dc2bb A python exploit tool finder.
portmanteau 1.0 An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface.
portspoof 100.70b6bf2 This program’s primary goal is to enhance OS security through a set of new techniques.
posttester 0.1 A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.
powerfuzzer 1_beta Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled,, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others.
powersploit 316.9e771d1 A PowerShell Post-Exploitation Framework.
pr0cks 15.9b51a52 python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target.
prads 1124.dabcaa2 Is a “Passive Real-time Asset Detection System”.
praeda 37.093d1c0 An automated data/information harvesting tool designed to gather critical information from various embedded devices.
princeprocessor 115.26cefc9 Standalone password candidate generator using the PRINCE algorithm.
procyon 0.5.30 A suite of Java metaprogramming tools focused on code generation and analysis.
prometheus 176.a316d66 A Firewall analyzer written in ruby
propecia 2 A fast class scanner that scans for a specified open port with banner grabbing
protos-sip 2 SIP test suite.
proxenet 589.3e07775 THE REAL hacker friendly proxy for web application pentests.
proxychains-ng 4.10 A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies
proxycheck 0.1 This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver.
proxyp 2013 Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.
proxyscan 0.3 A security penetration testing tool to scan for hosts and ports through a Web proxy server.
proxytunnel 1.9.0 a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy
pscan 1.3 A limited problem scanner for C source files
pshitt 23.dae7931 A lightweight fake SSH server designed to collect authentication data sent by intruders.
pstoreview 1.0 Lists the contents of the Protected Storage.
ptf 407.f329a9a The Penetration Testers Framework is a way for modular support for up-to-date tools.
ptunnel 0.72 A tool for reliably tunneling TCP connections over ICMP echo request and reply packets
pwd-hash 2.0 A password hashing tool that use the crypt function to generate the hash of a string given on standard input.
pwdump 7.1 Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.
pwnat 9.1d07c2e A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other.
pwntools 2.2.0 The CTF framework used by #Gallopsled in every CTF.
pyersinia 47.e59812b Network attack tool like yersinia but written in Python.
pyew 100.2d086a1 A python tool to analyse malware.
pyexfil 36.978ec43 A couple of beta stage tools for data exfiltration.
pyfiscan 1420.192d978 Free web-application vulnerability and version scanner.
pyinstaller 3.0 A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX.
pyminifakedns 0.1 Minimal DNS server written in Python; it always replies with a A-record
pyrasite 2.0 Code injection and introspection of running Python processes.
pyrit 0.4.0 WPA/WPA2-PSK attacking with gpu and cluster
pytacle alpha2 Automates the task of sniffing GSM frames
pytbull 2.0 A python based flexible IDS/IPS testing framework shipped with more than 300 tests
python-capstone 3.0.4 A lightweight multi-platform, multi-architecture disassembly framework
python-utidylib 0.2 Python bindings for Tidy HTML parser/cleaner.
python2-binaryornot 0.4.0 Ultra-lightweight pure Python package to check if a file is binary or text.
python2-capstone 3.0.4 A lightweight multi-platform, multi-architecture disassembly framework
python2-yara 3.4.0 Tool aimed at helping malware researchers to identify and classify malware samples
qark 7.c9a4c00 Tool to look for several security related Android application vulnerabilities.
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.
radamsa 0.4 General purpose data fuzzer.
radare2 0.9.9 Open-source tools to disasm, debug, analyze and manipulate binary files
radiography 2 A forensic tool which grabs as much information as possible from a Windows system.
rainbowcrack 1.6 Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches.
rarcrack 0.2 This program uses bruteforce algorithm to find correct password (rar, 7z, zip).
ratproxy 1.58 A passive web application security assessment tool
rawr 56.73eacf7 Rapid Assessment of Web Resources. A web enumerator.
rcracki-mt 0.7.0 A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project
rdesktop-brute 1.5.0 It connects to windows terminal servers – Bruteforce patch included.
reaver 1.4 Brute force attack against Wifi Protected Setup
rebind 0.3.4 DNS Rebinding Tool
recon-ng 4.7.1 A full-featured Web Reconnaissance framework written in Python.
recoverjpeg 2.6 Recover jpegs from damaged devices.
recstudio 4.0_20130717 Cross platform interactive decompiler
redfang 2.5 Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices’ Bluetooth addresses and calling read_remote_name().
redirectpoison 1.1 A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses.
redpoint 120.8fdb09d Digital Bond’s ICS Enumeration Tools.
regeorg 26.22fb8a9 The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
reglookup 1.0.1 Command line utility for reading and querying Windows NT registries
relay-scanner 1.7 An SMTP relay scanner.
replayproxy 1.1 Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file.
responder 152.392257b A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
reverse 546.6a5b101 Reverse engineering tool for x86/ARM/MIPS. Generates indented pseudo-C with colored syntax code.
revipd 5.2aaacfb A simple reverse IP domain scanner.
rext 30.5f217b3 Router EXploitation Toolkit – small toolkit for easy creation and usage of various python scripts that work with embedded devices.
rfcat 150225 RF ChipCon-based Attack Toolset.
rfdump 1.6 A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible
rfidiot 71.ed1732f An open source python library for exploring RFID devices.
rfidtool 0.01 A opensource tool to read / write rfid tags
ridenum 40.a50ea22 A null session RID cycle attack for brute forcing domain controllers.
rifiuti2 0.6.1 A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file.
rinetd 0.62 internet redirection server
ripdc 0.2 A script which maps domains related to an given ip address or domainname.
rkhunter 1.4.2 Checks machines for the presence of rootkits and other unwanted tools.
rlogin-scanner 0.2 Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris.
rootbrute 0.1 Local root account bruteforcer.
ropeadope 1.1 A linux log cleaner.
ropeme 1.0 ROPME is a set of python scripts to generate ROP gadgets and payload.
ropgadget 5.4 Lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation.
ropper 1.7.2 Show information about binary files and find gadgets to build rop chains for different architectures
roputils 179.2c00803 A Return-oriented Programming toolkit.
rp 136.5f0841c A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries.
rpcsniffer 7.9fab095 Sniffs WINDOWS RPC messages in a given RPC server process.
rpdscan 2.a71b0f3 Remmina Password Decoder and scanner.
rrs 1.70 A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more.
rsakeyfind 1.0 A tool to find RSA key in RAM.
rsmangler 1.4 rsmangler takes a wordlist and mangle it
rtlamr 197.03369d1 An rtl-sdr receiver for smart meters operating in the 900MHz ISM band.
rtlizer 35.5614163 Simple spectrum analyzer.
rtlsdr-scanner 916.ac0b64a A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library.
rtp-flood 1.0 RTP flooder
rtpbreak 1.3a Detects, reconstructs and analyzes any RTP session
rubilyn 0.0.1 64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host.
ruby-msgpack 0.7.0 MessagePack, a binary-based efficient data interchange format.
rww-attack 0.9.2 The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server’s ‘Remote Web Workplace’ portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out.
safecopy 1.7 A disk data recovery tool to extract data from damaged media.
sagan 1.0.0 A snort-like log analysis engine.
sakis3g 0.2.0e An all-in-one script for connecting with 3G
sambascan 0.5.0 Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds.
samdump2 3.0.0 Dump password hashes from a Windows NT/2k/XP installation
samydeluxe 2.2ed1bac Automatic samdump creation script.
sandy 6.531ab16 An open-source Samsung phone encryption assessment framework
saruman 1.1a8e77d ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection).
sasm 3.2.0 A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages.
sb0x 19.04f40fe A simple and Lightweight framework for Penetration testing.
sbd 1.36 Netcat-clone, portable, offers strong encryption – features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more
scalpel 2.0 A frugal, high performance file carver
scanmem 0.15.4 Memory scanner designed to isolate the address of an arbitrary variable in an executing process
scanssh 2.1 Fast SSH server and open proxy scanner.
scapy 2.3.1 A powerful interactive packet manipulation program written in Python
schnappi-dhcp 0.1 schnappi can fuck network with no DHCP
scout2 453.a616215 Security auditing tool for AWS environments.
scrape-dns 58.3df392f Searches for interesting cached DNS entries.
scrapy 1.0.3 A fast high-level scraping and web crawling framework.
scrounge-ntfs 0.9 Data recovery program for NTFS file systems
sctpscan 34.4d44706 A network scanner for discovery and security.
sdn-toolkit 1.01 Discover, Identify, and Manipulate SDN-Based Networks
search1337 10.0fb8cc1 1337Day Online Exploit Scanner.
seat 0.3 Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities.
secscan 1.5 Web Apps Scanner and Much more utilities.
secure-delete 3.1 Secure file, disk, swap, memory erasure utilities.
sees 67.cd741aa Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company’s domain.
sergio-proxy 0.2.1 A multi-threaded transparent HTTP proxy for manipulating web traffic
sessionlist 1.0 Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth.
set 6.5.9 Social-engineer toolkit. Aimed at penetration testing around Social-Engineering.
sfuzz 0.7.0 A simple fuzzer.
shareenum 46.3bfa81d Tool to enumerate shares from Windows hosts.
shellcodecs 0.1 A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.
shellme 3.8c7919d Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.
shellnoob 2.1 A toolkit that eases the writing and debugging of shellcode
sherlocked 1.f190c2b Universal script packer– transforms any type of script into a protected ELF executable, encrypted with anti-debugging.
shocker 52.4c9df3a A tool to find and exploit servers vulnerable to Shellshock.
shodan 1.3.8 Python library for Shodan (
shortfuzzy 0.1 A web fuzzing script written in perl.
sidguesser 1.0.5 Guesses sids/instances against an Oracle database according to a predefined dictionary file.
siege 3.1.1 An http regression testing and benchmarking utility
silk A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks.
simple-ducky 1.1.1 A payload generator.
simple-lan-scan 1.0 A simple python script that leverages scapy for discovering live hosts on a network.
sinfp 1.22 A full operating system stack fingerprinting suite.
siparmyknife 11232011 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
sipcrack 0.2 A SIP protocol login cracker.
sipp 3.3 A free Open Source test tool / traffic generator for the SIP protocol.
sipsak 0.9.6 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
sipscan 0.1 A sip scanner.
sipshock 6.1d636ab A scanner for SIP proxies vulnerable to Shellshock.
sipvicious 0.2.8 Tools for auditing SIP devices
skipfish 2.10b A fully automated, active web application security reconnaissance tool
skyjack 7.5f7a25e Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.
skype-dump 0.1 This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.
skypefreak 30.14a81cb A Cross Platform Forensic Framework for Skype.
sleuthkit 4.2.0 File system and media management forensic analysis tools
slowhttptest 1.6 A highly configurable tool that simulates application layer denial of service attacks.
slowloris 0.7 A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver.
smali 2.1.0 An assembler/disassembler for Android’s dex format
smartphone-pentest-framework 104.fc45347 Repository for the Smartphone Pentest Framework (SPF).
smbbf 0.9.1 SMB password bruteforcer.
smbexec 148.7827616 A rapid psexec style attack with samba tools.
smbmap 54.57b0176 A handy SMB enumeration tool.
smbrelay 3 SMB / HTTP to SMB replay attack toolkit.
smbspider 10.7db9323 A lightweight python utility for searching SMB/CIFS/Samba file shares.
smikims-arpspoof 14.7fd3021 Performs an ARP spoofing attack using the Linux kernel’s raw sockets.
smtp-fuzz 1.0 Simple smtp fuzzer none
smtp-test 3.acbe743 Automated testing of SMTP servers for penetration testing.
smtp-user-enum 1.2 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
smtp-vrfy 1.0 An SMTP Protocol Hacker.
smtpmap 0.8.234_BETA Tool to identify the running smtp software on a given host.
smtpscan 0.5 An SMTP scanner
smtptx 1.0 A very simple tool used for sending simple email and do some basic email testing from a pentester perspective.
sn00p 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests.
sn1per 34.6bf6263 Automated Pentest Recon Scanner.
snapception 8.c156f9e Intercept and decrypt all snapchats received over your network.
snarf-mitm 40.49cc8cb SMB Man in the Middle Attack Engine / relay suite.
sniffjoke 0.4.1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
snmp-brute 15.64ec0ce SNMP brute force, enumeration, CISCO config downloader and password cracking script.
snmp-fuzzer 0.1.1 SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.
snmpattack 1.8 SNMP scanner and attacking tool.
snmpcheck 1.8 A free open source utility to get information via SNMP protocols.
snmpenum 1.7 snmp enumerator
snmpscan 0.1 A free, multi-processes SNMP scanner
snoopbrute 17.589fbe6 Multithreaded DNS recursive host brute-force tool.
snoopy-ng 128.eac73f5 A distributed, sensor, data collection, interception, analysis, and visualization framework.
snort A lightweight network intrusion detection system.
snow 20130616 Steganography program for concealing messages in text files.
snscan 1.05 A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.
socat Multipurpose relay
sockstat 0.3 A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.
soot 2.5.0 A Java Bytecode Analysis and Transformation Framework.
spade 114 A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.
sparta 17.bdbf244 Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
sparty 0.1 An open source tool written in python to audit web applications using sharepoint and frontpage architecture.
spectools 2010_04_R1 Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.
speedpwn 8.3dd2793 An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.
spf 62.959d3e9 A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises.
spiderfoot 2.6.1 The Open Source Footprinting Tool.
spiderpig-pdffuzzer 0.1 A javascript pdf fuzzer
spiga 372.6d7ead3 Configurable web resource scanner.
spike 2.9 IMMUNITYsec’s fuzzer creation kit in C
spike-proxy 148 A Proxy for detecting vulnerabilities in web applications
spiped 1.5.0 A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
spipscan 69.4ad3235 SPIP (CMS) scanner for penetration testing purpose written in Python.
splint 3.1.2 A tool for statically checking C programs for security vulnerabilities and coding mistakes
sploitctl 46.ac00f34 Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
sploitego 153.d9568dc Maltego Penetration Testing Transforms.
spooftooph 0.5.2 Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight
sps 4.3 A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.
sqid 0.3 A SQL injection digger.
sqlbrute 1.0 Brute forces data out of databases using blind SQL injection.
sqlmap 7000.ae74810 An automatic SQL injection tool developed in Python.
sqlninja 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.
sqlpat 1.0.1 This tool should be used to audit the strength of Microsoft SQL Server passwords offline.
sqlping 4 SQL Server scanning tool that also checks for weak passwords using wordlists.
sqlsus 0.7.2 An open source MySQL injection and takeover tool, written in perl
ssdp-scanner 1.0 SSDP amplification scanner written in Python. Makes use of Scapy.
ssh-privkey-crack 0.4 A SSH private key cracker.
ssh-user-enum 5.3d83131 SSH User Enumeration Script in Python Using The Timing Attack.
sshatter 1.2 Password bruteforcer for SSH.
sshscan 1.0 A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.
sshtrix 0.0.2 A very fast multithreaded SSH login cracker.
sshuttle 0.73.20151215 Transparent proxy server that forwards all TCP packets over ssh
ssl-hostname-resolver 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
ssl-phuck3r 2.0 All in one script for Man-In-The-Middle attacks.
sslcat 1.0 SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
sslcaudit 522.5b6be3e Utility to perform security audits of SSL/TLS clients.
ssldump 0.9b3 an SSLv3/TLS network protocol analyzer
sslh 1.17 SSL/SSH/OpenVPN/XMPP/tinc port multiplexer
ssllabs-scan 1.2.0 Command-line client for the SSL Labs APIs
sslmap 0.2.0 A lightweight TLS/SSL cipher suite scanner.
sslnuke 5.c5faeaa Transparent proxy that decrypts SSL traffic and prints out IRC messages.
sslscan 1.10.2 A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported
sslsniff 0.8 A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly
sslsplit 0.4.11 A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections.
sslyze 0.12 Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations.
ssrf-proxy 72.a01a2fe Facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.
stackflow 2.2af525d Universal stack-based buffer overfow exploitation tool.
starttls-mitm 7.b257756 A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.
statsprocessor 0.11 A high-performance word-generator based on per-position Markov-attack.
steghide 0.5.1 Embeds a message in a file by replacing some of the least significant bits
stegolego 8.85354f6 Simple program for using stegonography to hide data within BMP images.
stenographer 381.468e695 A packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets.
stompy 0.0.4 An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.
storm-ring 0.1 This simple tool is useful to test a PABX with “allow guest” parameter set to “yes” (in this scenario an anonymous caller could place a call).
stunnel 5.26 A program that allows you to encrypt arbitrary TCP connections inside SSL
subbrute 1.2.1 A DNS meta-query spider that enumerates DNS records and subdomains
subdomainer 1.2 A tool designed for obtaining subdomain names from public sources.
subterfuge 5.0 Automated Man-in-the-Middle Attack Framework
sucrack 1.2.3 A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su
sulley 1.0.3bce87a A pure-python fully automated and unattended fuzzing framework.
superscan 4.1 Powerful TCP port scanner, pinger, resolver.
suricata 2.0.10 An Open Source Next Generation Intrusion Detection and Prevention Engine.
svn-extractor 28.3af00fb A simple script to extract all web resources by means of .SVN folder exposed over network.
swaks 20130209.0 Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH
swfintruder 0.9.1 First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.
synflood 0.1 A very simply script to illustrate DoS SYN Flooding attack.
synner 1.1 A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.
synscan 5.02 fast asynchronous half-open TCP portscanner
syringe 1.9786f35 A General Purpose DLL & Code Injection Utility.
sysdig 0.6.0 Open source system-level exploration and troubleshooting tool
sysinternals-suite 1.7 Sysinternals tools suite.
t50 5.5 Experimental Multi-protocol Packet Injector Tool.
taof 0.3.2 Taof is a GUI cross-platform Python generic network protocol fuzzer.
tbear 1.5 Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.
tcgetkey 0.1 A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.
tckfc 21.a32167e TrueCrypt key file cracker.
tcpcontrol-fuzzer 0.1 2^6 TCP control bit fuzzer (no ECN or CWR).
tcpdump 4.7.4 A tool for network monitoring and data acquisition
tcpextract 1.1 Extracts files from captured TCP sessions. Support live streams and pcap files.
tcpflow 1.4.5 Captures data transmitted as part of TCP connections then stores the data conveniently
tcpick 0.2.1 TCP stream sniffer and connection tracker
tcpjunk 2.9.03 A general tcp protocols testing and hacking utility.
tcpreplay 4.1.0 Gives the ability to replay previously captured traffic in a libpcap format
tcptraceroute 1.5beta7 A traceroute implementation using TCP packets.
tcpwatch 1.3.1 A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.
tcpxtract 1.0.1 A tool for extracting files from network traffic.
teardown 1.0 Command line tool to send a BYE request to tear down a call.
tekdefense-automater 83.279c89e IP URL and MD5 OSINT Analysis
termineter 0.1.0 Smart meter testing framework
testssl 2.6 Testing TLS/SSL encryption.
tftp-bruteforce 0.1 TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.
tftp-fuzz 1337 Master TFTP fuzzing script as part of the ftools series of fuzzers.
tftp-proxy 0.1 This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one’s nice if your mitm with some embedded devices.
thc-keyfinder 1.0 Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.
thc-pptp-bruter 0.1.4 A brute force program that works against pptp vpn endpoints (tcp port 1723).
thc-smartbrute 1.0 This tool finds undocumented and secret commands implemented in a smartcard.
thc-ssl-dos 1.4 A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!
theharvester 44.761d26b Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
themole 0.3 Automatic SQL injection exploitation tool.
tiger 3.2.3 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
tilt 90.2bc2ef2 An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
timegen 0.4 This program generates a *.wav file to “send” an own time signal to DCF77 compatible devices.
tinc 1.0.26 VPN (Virtual Private Network) daemon
tinfoleak 3.6469eb3 Get detailed information about a Twitter user activity.
tinyproxy 1.8.4 A light-weight HTTP proxy daemon for POSIX operating systems.
tlsenum 77.b60e2c8 A command line tool to enumerate TLS cipher-suites supported by a server.
tlspretense 0.6.2 SSL/TLS client testing framework
tlssled 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
tnscmd 1.3 a lame tool to prod the oracle tnslsnr process (1521/tcp)
topera 19.3e230fd An IPv6 security analysis toolkit, with the particularity that their attacks can’t be detected by Snort.
tor Anonymizing overlay network.
tor-autocircuit 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
torshammer 1.0 A slow POST Denial of Service testing tool written in Python.
torsocks 2.1.0 Wrapper to safely torify applications
tpcat latest TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest.
traceroute 2.0.21 Tracks the route taken by packets over an IP network
treasure 6.a91d52b Hunt for sensitive information through githubs code search.
trid 2.20 An utility designed to identify file types from their binary signatures.
trinity 4175.c8ea635 A Linux System call fuzzer.
trixd00r 0.0.1 An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.
truecrack 35 Password cracking for truecrypt(c) volumes.
truecrypt 7.1a Free open-source cross-platform disk encryption software
tsh 0.6 An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.
tsh-sctp 2.850a2da An open-source UNIX backdoor.
tunna 19.f8c1881 a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
tuxcut 5.1 Netcut-like program for Linux written in PyQt.
twofi 2.0 Twitter Words of Interest.
u3-pwn 2.0 A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install.
uatester 1.06 User Agent String Tester
ubertooth 2015.10.R1 A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only.
ubitack 0.3 Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.
udis86 1.7.2 A minimalistic disassembler library
udptunnel 19 Tunnels TCP over UDP packets.
uefi-firmware-parser 114.2a7fdff Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc
ufo-wardriving 4 Allows you to test the security of wireless networks by detecting their passwords based on the router model
ufonet 15.3e88380 A tool designed to launch DDoS attacks against a target, using ‘Open Redirect’ vectors on third party web applications, like botnet.
umap 25.3ad8121 The USB host security assessment tool.
umit 1.0 A powerful nmap frontend.
unhide 20130526 A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.
unibrute 1.b3fb4b7 Multithreaded SQL union bruteforcer.
unicorn 30.783adda A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.
unicornscan 0.4.7 A new information gathering and correlation engine.
uniofuzz 1337 The universal fuzzing tool for browsers, web services, files, programs and network services/ports
uniscan 6.2 A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
unix-privesc-check 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases)
unsecure 1.2 Bruteforces network login masks.
upnp-pentest-toolkit 1.1 UPnP Pentest Toolkit for Windows.
upnpscan 0.4 Scans the LAN or a given address range for UPnP capable devices.
upx 3.91 Ultimate executable compressor.
urlcrazy 0.5 Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
urldigger 02c A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code
urlview 0.9 A curses URL parser for text files.
username-anarchy 0.2 Tools for generating usernames when penetration testing.
usernamer 7.813139d Pentest Tool to generate usernames/logins based on supplied names.
uw-loveimap 0.1 Multi threaded imap bounce scanner.
uw-offish 0.1 Clear-text protocol simulator.
uw-udpscan 0.1 Multi threaded udp scanner.
uw-zone 0.1 Multi threaded, randomized IP zoner.
v3n0m 77.cdaf14e Popular linux version of Balthazar/NovaCygni’s ‘v3n0m’ scanner. Searches 18k+ dorks over 13 search engines.
valabind 0.9.2 Tool to parse vala or vapi files to transform them into swig interface files, C++, NodeJS-ffi or GIR
valgrind 3.11.0 A tool to help find memory-management problems in programs
vane 1855.6a47cd8 A vulnerability scanner which checks the security of WordPress installations using a black box approach.
vanguard 0.1 A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications.
vbrute 1.11dda8b Virtual hosts brute forcer.
vbscan 12.947622a A black box vBulletin vulnerability scanner written in perl.
vega 1.0 An open source platform to test the security of web applications
veil 477.dbe0e70 A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
veracrypt 1.16 Free disk encryption software, TrueCrypt fork.
vfeed 49.c8cf0ec Open Source Cross Linked and Aggregated Local Vulnerability Database main repository.
vidalia 0.2.21 Controller GUI for Tor.
videosnarf 0.63 A new security assessment tool for pcap analysis
vinetto 0.07beta A forensics tool to examine Thumbs.db files
viper 896.ad55b15 A Binary analysis framework.
viproy-voipkit 2.99.1 VoIP Pen-Test Kit for Metasploit Framework
virustotal 4.9aea023 Command-line utility to automatically lookup on VirusTotal all files recursively contained in a directory.
vivisect 20140803 A Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto
vlan-hopping 16.a2959fe Easy 802.1Q VLAN Hopping
vmcloak 0.3.6 Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.
vnak 1.cf0fda7 Aim is to be the one tool a user needs to attack multiple VoIP protocols.
vnc-bypauth 0.0.1 Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.
vncrack 1.21 What it looks like: crack VNC.
voiper 0.07 A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.
voiphopper 2.04 A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
voipong 2.0 A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.
vstt 0.5.0 VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.
vsvbp 6.241a7ab Black box tool for Vulnerability detection in web applications.
vulscan 2.0 A module which enhances nmap to a vulnerability scanner
w3af 1.6.49 Web Application Attack and Audit Framework.
waffit 39 A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website.
wafp 0.01_26c3 An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.
waidps 16.ff8d270 Wireless Auditing, Intrusion Detection & Prevention System.
waldo 28.a33de7a A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.
wapiti 2.3.0 A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections…
wavemon 0.7.6 Ncurses-based monitoring application for wireless network devices
web-soul 2 A plugin based scanner for attacking and data mining web sites written in Perl.
webacoo 0.2.3 Web Backdoor Cookie Script-Kit.
webenum 0.1 Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.
webhandler 323.176dc8f A handler for PHP system functions & also an alternative ‘netcat’ handler.
webpwn3r 35.3fb27bb A python based Web Applications Security Scanner.
webrute 3.3 Web server directory brute forcer.
webscarab 20120422.001828 Framework for analysing applications that communicate using the HTTP and HTTPS protocols
websearch 1.cce2384 Search vhost names given a host range. Powered by Bing..
webshag 1.10 A multi-threaded, multi-platform web server audit tool.
webshells 6.cf73228 Web Backdoors.
webslayer 5 A tool designed for brute forcing Web Applications.
websockify 0.7.0 WebSocket to TCP proxy/bridge.
webspa 0.8 A web knocking tool, sending a single HTTP/S to run O/S commands.
websploit 3.0.0 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks
webxploiter 20.41a11d1 An OWASP Top 10 Security scanner.
weeman 73.358d60e HTTP Server for phishing in Python.
weevely 663.d55840c Weaponized web shell.
wepbuster 1.0_beta_0.7 script for automating aircrack-ng
wfuzz 37.574caa5 Utility to bruteforce web applications to find their not linked resources.
whatweb 4071.c489fbd Next generation web scanner that identifies what websites are running.
wi-feye 1.1 An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.
wifi-honey 1.0 A management tool for wifi honeypots
wifi-monitor 24.33b682e Prints the IPs on your local network that’re sending the most packets.
wificurse 0.3.9 WiFi jamming tool.
wifijammer 58.82c9f40 A python script to continuosly jam all wifi clients within range.
wifiphisher 126.c08f80d Fast automated phishing attacks against WPA networks.
wifitap 2b16088 WiFi injection tool through tun/tap device.
wifite 2.28fc5cd A tool to attack multiple WEP and WPA encrypted networks at the same time.
wig 518.27ddeaa WebApp Information Gatherer.
wikigen 8.348aa99 A script to generate wordlists out of wikipedia pages.
wildpwn 9.379f0da Unix wildcard attacks.
windows-privesc-check 181.9f304fd Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems.
winexe 1.00 Remotely execute commands on Windows NT/2000/XP/2003 systems.
winfo 2.0 Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.
wireless-ids 24.b132071 Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
wireshark-cli 2.0.0 a free network protocol analyzer for Unix/Linux and Windows – CLI version
wireshark-gtk 2.0.0 a free network protocol analyzer for Unix/Linux and Windows – GTK frontend
wirouter-keyrec 1.1.2 A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).
witchxtool 1.1 A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.
wlan2eth 1.3 Re-writes 802.11 captures into standard Ethernet frames.
wmat 0.1 Automatic tool for testing webmail accounts.
wnmap 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.
wol-e 2.0 A suite of tools for the Wake on LAN feature of network attached computers.
wordbrutepress 28.8061c52 Python script that performs brute forcing against WordPress installs using a wordlist.
wordpot 38.ca12cb5 A WordPress Honeypot.
wpa-bruteforcer 4.d5f8586 Attacking WPA/WPA encrypted access point without client.
wpa2-halfhandshake-crack 26.84fa6be A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.
wpbf 7.11b6ac1 Multithreaded WordPress brute forcer.
wpbrute-rpc 3.e7d8145 Tool for amplified bruteforce attacks on wordpress based website via xmlrcp API.
wpscan 1995.7c5d15e A vulnerability scanner which checks the security of WordPress installations using a black box approach.
ws-attacker 1.7 A modular framework for web services penetration testing.
wsfuzzer 1.9.5 A Python tool written to automate SOAP pentesting of web services.
wsuspect-proxy 20.60fddc7 A tool for MITM’ing insecure WSUS connections.
wyd 0.2 Gets keywords from personal files. IT security/forensic tool.
x-scan 3.3 A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.
xcat 0.7.1 A command line tool to automate the exploitation of blind XPath injection vulnerabilities.
xcavator 5.bd9e2d8 Man-In-The-Middle and phishing attack tool that steals the victim’s credentials of some web services like Facebook.
xcname 9.08942ae A tool for enumerating expired domains in CNAME records.
xf86-video-qxl-git r541.cbe70e9 Xorg X11 qxl video driver.
xorbruteforcer 0.1 Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.
xorsearch 1.11.1 Program to search for a given string in an XOR, ROL or ROT encoded binary file.
xortool 0.96 A tool to analyze multi-byte xor cipher.
xpire-crossdomain-scanner 1.0cb8d3b Scans crossdomain.xml policies for expired domain names.
xpl-search 38.b858c2c Search exploits in multiple exploit databases!.
xplico 33.0f6d8bc Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT).
xprobe2 0.3 An active OS fingerprinting tool.
xspy 1.0c A utility for monitoring keypresses on remote X servers
xsser 1.6 A penetration testing tool for detecting and exploiting XSS vulnerabilites.
xssless 35.9eee648 An automated XSS payload generator written in python.
xsss 0.40b A brute force cross site scripting scanner.
xssscan 17.7f1ea90 Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.
xsssniper 0.9 An automatic XSS discovery tool
xsstracer 4.aa84fcc Python script that checks remote web servers for Clickjacking, Cross-Frame Scripting, Cross-Site Tracing and Host Header Injection.
xssya 12.abe1aec A Cross Site Scripting Scanner & Vulnerability Confirmation.
xxeinjector 42.42bec96 Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
yaaf 7.4d6273a Yet Another Admin Finder.
yaf 2.7.1 Yet Another Flowmeter.
yara 3.4.0 Tool aimed at helping malware researchers to identify and classify malware samples
yasat 839 Yet Another Stupid Audit Tool.
yasuo 88.773b4f8 A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network.
ycrawler 0.1 A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. It has proxy and log file support.
yersinia 0.7.3 A network tool designed to take advantage of some weakness in different network protocols.
yinjector 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
zackattack 5.1f96c14 A new tool set to do NTLM Authentication relaying unlike any other tool currently out there.
zaproxy 2.4.2 Integrated penetration testing tool for finding vulnerabilities in web applications
zarp 0.1.7 A network attack tool centered around the exploitation of local networks.
zerowine 0.0.2 Malware Analysis Tool – research project to dynamically analyze the behavior of malware
zgrab 383.d9f42ab Grab banners (optionally over TLS).
zmap 2.1.1 Fast network scanner designed for Internet-wide network surveys
zulu 0.1 A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.
zykeys 0.1 Demonstrates how default wireless settings are derived on some models of ZyXEL routers.
zzuf 0.14 Transparent application input fuzzer.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s