Web Applications

Raptor Web Application Firewall

Raptor Web Application Firewall Raptor Web Application Firewall  is a simple web application firewall made in C, using KISS principle, to make poll use select()...

Stay Connected

171FansLike
32FollowersFollow

Cryptography and Encryption

Open Source Ransomware hidden tear

Open Source Ransomware hidden tear Open Source Ransomware hidden tear like file crypter sample that you can modify for your specific purpose. Features Uses AES algorithm to...
Ransomware Crypter Kit eda2

Ransomware Crypter Kit eda2

Digital Forensics

Volatility Framework Web Interface VolUtility

Volatility Framework Web Interface VolUtility After Evolve, web interface for the volatility forensics framework,  many developers started to work on web interface for one of...
Firmware Analysis Tool Binwalk

Firmware Analysis Tool Binwalk

Exploitation Tools

Python Keylogger Radium

Python Keylogger With Multiple Features Python Keylogger Radium Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the...

Information Gathering

Collaborative Penetration Test & Vulnerability Management Platform Faraday

Collaborative Penetration Test & Vulnerability Management Platform Faraday introduces a new concept – IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distribution,...

Maintaining Access

JavaScript WebSocket Backdoor BrowserBackdoor

JavaScript WebSocket Backdoor and Ruby Command-Line Listener BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener. BrowserBackdoorServer is a...

Man In The Middle

Automating Phishing Activities PhishLulz

Automating Phishing Activities PhishLulz is a Ruby toolset aimed at automating Phishing activities When you start a phishing campaign, a dedicated Amazon EC2 (Debian 7) instance...

Pentest Linux Distributions

Kali Linux NetHunter

Kali Linux NetHunter

Offensive Security have obsessively been building Kali on weird and wonderful ARM hardware and today, we are proud to reveal their latest creation – the Kali Linux NetHunter. NetHunter is a Android penetration testing platform...
Pentesting Distribution Wireless Security: Xiaopan OS

Pentesting Distribution Wireless Security: Xiaopan OS

Pentesting Distribution Wireless Security: Xiaopan OS Pentesting Distribution Wireless Security: Xiaopan OS is an easy to use software package for beginners and experts that includes a number of advanced hacking tools to...
Amnesic Incognito Live System Tails

Amnesic Incognito Live System Tails

Amnesic Incognito Live System Tails Amnesic Incognito Live System Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent...
Digital Forensics Distro CAINE

Digital Forensics Distro CAINE

Digital Forensics Distro CAINE Digital Forensics Distro CAINE (an acronym for Computer Aided Investigative Environment’) is an Ubuntu-based GNU/Linux live distribution live oriented to Computer Forensics (computer forensics) historically conceived by Giancarlo...

Vulnerability Analysis