There are no reviews yet. Be the first to send feedback to the community and the maintainers!
dhcpig
dhcpig : initiates an advanced DHCP exhaustion attackcisco-torch
cisco-torch : mass scanning, fingerprinting, and exploitation toolcisco-global-exploiter
cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switchest50
t50 : Multi-protocol packet injector toolrcracki_mt
rcracki_mt : used to perform a rainbow table attack on password hashesophcrack
Ophcrack : Windows password cracker based on rainbow tablescisco-auditing-tool
cisco-auditing-tool : Scans cisco routers for common vulnerabilitiesinviteflood
inviteflood : SIP/SDP INVITE message flooding over UDP/IPhashmyfiles
hashmyfiles : Finds md5 and Calculate MD5/SHA1/CRC32 hashes of any filefcrackzip
fcrackzip - Fast zip password crackerYaraGenerator
YaraGenerator : YaraGenerator is an open-source toolset which allows for quick, effective, and automatic YARA signature creation from a number of malicious filetypespdfid
pdfid : PDF analysis tooliphoneanalyzer
iphoneanalyzer : Explores internal file structure of iphone and many more featuresrtpflood
rtpflood : Tool to flood any RTP devicerainbowcrack
rainbowcrack - Cracks hashing with rainbow tablessfuzz
sfuzz : A simple fuzzervinetto
Vinetto : Forensic tool to examine Thumbs.db filespeframe
PEframe : Tool to perform staic analysis on portable executables (*.exe) filesivmeta
ivmeta : extracts various bits of meta data from videos created on an iPhone including date filmed, GPS co-ords and phone and iOS versionspowerfuzzer
powerfuzzer : Highly automated, fully customizable HTTP protocol based application fuzzerIOC-writer
IOC-writer : Editor for Indicators of Compromise (IOCs)pescanner
pescanner : Portable Executable(Win32/Win64) Scanneryara-editor
yara-editor : YARA is a tool aimed at helping malware researchers to identify and classify malware samples. 'yara-editor'allows the editing of YARA rules.undbx
undbx : Extracts, recovers and undelete e-mail messages from Outlook Express .dbx filesbrutexor
brutexor : XOR bruteforce based on another file of the same typehachoir-metadata
hachoir-metadata : Extracts metadata from video, music and other fileshachoir-parser
hachoir-parser : package of most common file format parsers written for Hachoir frameworkdensityscout
densityscout : This tool calculates density (like entropy) for files of any file-system-path to finally output an accordingly descending ordered list. This makes it possible to quickly find (even unknown) malware on a potentially infected Microsoft Windows driven machinexortool
xortool : Guesses key length, key and decrypt a XOR encrypted filesiparmyknife
SIPArmyKnife : Fuzzer that searches for cross site scripting, SQL injection, log injection, format strings, buffer overflows, and more.webfuzzer
webfuzzer : web vulnerability scannersmbmap
smbmap : Handy SMB enumeration toolcmospwd
CmosPwd - Cross-platform tool to decrypt password stored in CMOS used to access a computer’s BIOS setup.Samdump2
Samdump2: Dumps Windows 2k/NT/XP/Vista password hashesIOC-Parser
IOC-Parser : Extracts indicators of compromise(IOC) from security reports in PDF formatcopy-router-config
copy-router-config : copies configuration files from Cisco devices running SNMPexescan
exescan : ExeScan is a console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and detect all kind of anomalies in its PE header fields including checksum verifications, size of various header fields, improper size of raw data, non-ascii/empty section names etc.balbuzard
balbuzard : Balbuzard is a package of malware analysis tools in python to extract patterns from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). It can also crack malware obfuscation such as XOR, ROL, etc by bruteforcing and checking for those patternsexiftool
exiftool : Allows reading, writing and editing meta information in a wide variety of filesncrack
ncrack - High speed network authentication cracking toolhydra
Hydra : Very fast network logon crackerrtpinsertsound
rtpinsertsound : Tool to insert audio into a specified audio streambytecode-viewer
bytecode-viewer : A Java Jar & Android APK Reverse Engineering Suitertpbreak
rtpbreak : Detects, reconstructs and analyzes RTP sessionspatator
patator : Multi-purpose brute-forcermultiforcer
multiforcer : Multi-GPU password crackerbinwalk
binwalk : Firmware analysis toolJD-GUI
JD-GUI : Provides GUI for JAD - Java Decompilerenumiax
enumiax - IAX protocol username enumeratorRATDecoders
RATDecoders : Python Decoding scripts for Common Remote Access Trojansyersinia
yersinia : solid framework for analyzing and testing the deployed networks and systemstkdiff-unix
tkdiff-unix : Displays difference between filesparos
paros : evaluates the security of their web applicationshashid
hashid : Software to identify different types of hashesmaskgen-CentOS-6.6-x86_64
maskgen : MaskGen allows you to craft pattern-based mask attacks for input into Hashcat family of password crackers.hash-identifier
hash-identifier : Software to identify the different types of hashes used to encrypt data and especially passwordsafflib_v3
afflib : The Advanced Forensic Format Library and Tools Version 3sleuthkit
sctpscan
sctpscan : SCTP network scanner for discover and securitynikto
nikto : Web scanner (Version : 2.1.5)crunch
crunch : Custom wordlist generator based on the set of characters specifiediaxflood
iaxflood : VoIP flooder toolthc-ssl-dos
thc-ssl-dos : Stress tester for SSL handshakemaltrieve
maltrieve : A tool to retrieve malware directly from the source for security researchersgolismero
golismero : helps to map a web application, displays comfortable format for security auditors and it can be integrated with other web hacking tools w3af, wfuzz, netcat, nikto etc.Love Open Source and this site? Check out how you can help us