Kali Linux

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you…

6 years ago

ZeebSploit: Web Scanner Exploitation Information Gathering

ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. Installation & Usage apt-get…

6 years ago

MySQL Magic: Dump MySQL Client Password From Memory

I made this just for fun, use for illegal purposes are not allowed. The mysql client read the password, then…

6 years ago

MXtract : Memory Extractor & Analyzer 2019

MXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing…

6 years ago

Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product…

6 years ago

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.…

6 years ago

Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework

Pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team. It comes with a powerful proof-of-concept…

6 years ago

XanXSS : A Simple XSS Finding Tool

XanXSS is a reflected XSS searching tool (DOM coming soon) that creates payloads based from templates. Unlike other XSS scanners…

6 years ago

Pyrit : The Famous WPA Pre-Computed Cracker, Migrated from Google

Pyrit allows you to create massive databases of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power…

6 years ago

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble managed and…

6 years ago