|Brute-force attack that supports multiple protocols and services
|Tries to decrypt one of the encrypted addresses in the wallet by trying all the possible passwords
|Blind SQL Injection Brute Forcer
|Download and use custom hosts sources to build /etc/hosts
|An integrated platform for attacking web applications (free edition).
|A display-oriented editor for binary files operate like 'vi' editor
|The hidden RDP client recorder
|A transform framework for maltego
|The carwhisperer project intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
|Cisco discovery protocol sniffer
|A Panic button for protection against cold boot attacks
|A custom word list generator
|A default credential scanner
|Fetch application data from snoop or tcpdump logs
|Checks an the validity of an International Bank Account Number (IBAN)
|A framework for analyzing security of PC platforms including hardware, system firmware including BIOS/UEFI and the configuration of platform components.
|A fast TCP tunnel over HTTP
|Checks for rootkits on a system
|Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other
|A better SSL cipher checker using gnutls
|Cisco Router Default Password Scanner
|copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
|Cisco Torch mass scanning, fingerprintinging, and exploit tool.
|A routing engine designed for security, scalability, speed and ease of use
|Limit network access of bind-compatible programs to the local cjdns network
|Decrypts password stored in CMOS used to access BIOS setup.
|Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running
|A GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms
|Find and exploit a command injection vulnerability in a certain vulnerable parameter or string.
|Small C library usefull to easy build ipv4/ipv6 network daemons/clients
|Cookiecutter templates discovery and management.
|This library tries to intercept the memory allocations to skew the allocations to different offsets, so the performance penalty to disappear
|Your best friend in credential reuse attacks
|Crack and decrypt BLE encryption
|A swiss army knife for pentesting Windows/Active Directory environments
|Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.
|A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
|A wordlist generator for all combinations/permutations of a given character set
|A lightweight version of netcat with integrated transport encryption capabilities.
|A TCP/UDP symmetric encryption tunnel wrapper
|Utility which allows an ordinary user to mount an encrypted file system
|High performance multihash brute forcer with CUDA support
|SSL security checker
|The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
|Common User Password Profiler
|A stealth backdooring tool, that inject backdoor's shellcode into an existing process.
|An ARMv7 disassembling library written in C.
|A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites
|Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target