Top 5 DDoS Attacking Tools For Linux,Windows & Android

6 years ago

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many computers are…

Pftriage : Python Tool & Library To Help Analyse Files During Malware Triage & Analysis

6 years ago

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view and extract…

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

6 years ago

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily.…

LeakLooker : Find open databases with Shodan

6 years ago

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results…

Malice : VirusTotal Wanna Be – Now with 100% more Hipster

6 years ago

Malice mission is to be a free open source version of VirusTotal that anyone can use at any scale from…

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

6 years ago

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy,…

Pwndb : Search For Leaked Credentials

6 years ago

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name. Usage usage:…

PF_RING : High-Speed Packet Processing Framework

6 years ago

PF_RING is a Linux kernel module and user-space framework that allows you to process packets at high-rates while providing you…

CIRTKit : Tools for the Computer Incident Response Team

6 years ago

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top…

Modlishka : A Flexible And Powerful Reverse Proxy Tool

6 years ago

Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It…