diff --git a/data/automation b/data/automation index 93e6f28f..58060048 100644 --- a/data/automation +++ b/data/automation @@ -3,7 +3,7 @@ automato|33.0561b59|Should help with automating some of the user-focused enumera autonessus|24.7933022|This script communicates with the Nessus API in an attempt to help with automating scans.|https://github.com/redteamsecurity/AutoNessus autonse|25.7c87f4c|Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner.|https://github.com/m4ll0k/AutoNSE autopwn|190.fc80cef|Specify targets and run sets of tools against them.|https://github.com/nccgroup/autopwn -autorecon|254.fec09fb|A multi-threaded network reconnaissance tool which performs automated enumeration of services.|https://github.com/Tib3rius/AutoRecon +autorecon|257.f724be8|A multi-threaded network reconnaissance tool which performs automated enumeration of services.|https://github.com/Tib3rius/AutoRecon awsbucketdump|82.4684670|A tool to quickly enumerate AWS S3 buckets to look for loot.|https://github.com/jordanpotti/AWSBucketDump bashfuscator|338.7487348|Fully configurable and extendable Bash obfuscation framework.|https://github.com/Bashfuscator/Bashfuscator blueranger|1.0|A simple Bash script which uses Link Quality to locate Bluetooth device radios.|http://www.hackfromacave.com/projects/blueranger.html @@ -11,9 +11,9 @@ bopscrk|72.34fb3fd|Tool to generate smart wordlists, eg. based on lyrics.|https: brutespray|195.20f36bd|Brute-Forcing from Nmap output - Automatically attempts default creds on found services.|https://github.com/x90skysn3k/brutespray brutex|107.3f43505|Automatically brute force all services running on a target.|https://github.com/1N3/BruteX byepass|213.8cbfd9b|Automates password cracking tasks using optimized dictionaries and mangling rules.|https://github.com/webpwnized/byepass -cewl|136.2b6e370|A custom word list generator.|http://www.digininja.org/projects/cewl.php +cewl|138.ddda1c0|A custom word list generator.|http://www.digininja.org/projects/cewl.php cheat-sh|6|The only cheat sheet you need.|https://cheat.sh -checksec|2.5.0|Tool designed to test which standard Linux OS and PaX security features are being used|https://github.com/slimm609/checksec.sh +checksec|2.6.0|Tool designed to test which standard Linux OS and PaX security features are being used|https://github.com/slimm609/checksec.sh cisco-snmp-enumeration|10.ad06f57|Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.|https://github.com/nccgroup/cisco-snmp-enumeration clusterd|143.d190b2c|Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.|https://github.com/hatRiot/clusterd codeql|2.8.1|The CLI tool for GitHub CodeQL|https://github.com/codeql @@ -61,7 +61,7 @@ nfspy|1.0|A Python library for automating the falsification of NFS credentials w nfsshell|19980519|Userland NFS command tool.|http://www.paramecium.org/~leendert/ nosqlattack|98.a5b0329|Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks.|https://github.com/youngyangyang04/NoSQLAttack nullscan|1.0.1|A modular framework designed to chain and automate security tests.|http://www.nullsecurity.net/tools/automation.html -openscap|1.3.6.r37.g39e96abd4|Open Source Security Compliance Solution.|https://www.open-scap.org/ +openscap|1.3.6.r42.g72dd8ba0f|Open Source Security Compliance Solution.|https://www.open-scap.org/ panoptic|185.df35a6c|A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.|https://github.com/lightos/Panoptic pastejacker|12.ed9f153|Hacking systems with the automation of PasteJacking attacks.|https://github.com/D4Vinci/PasteJacker pasv-agrsv|57.6bb54f7|Passive recon / OSINT automation script.|https://github.com/isaudits/pasv-agrsv diff --git a/data/binary b/data/binary index 7e6552d4..ef703170 100644 --- a/data/binary +++ b/data/binary @@ -37,7 +37,7 @@ klee|2.1|A symbolic virtual machine built on top of the LLVM compiler infrastruc leena|2.5119f56|Symbolic execution engine for JavaScript|https://github.com/mmicu/leena loadlibrary|104.c40033b|Porting Windows Dynamic Link Libraries to Linux.|https://github.com/taviso/loadlibrary ltrace|0.7.3|Tracks runtime library calls in dynamically linked programs|https://www.ltrace.org/ -manticore|0.2.4.r343.g9e11bc9a|Symbolic execution tool.|https://github.com/trailofbits/manticore +manticore|0.2.4.r346.gdc998800|Symbolic execution tool.|https://github.com/trailofbits/manticore metame|14.8d583a0|A simple metamorphic code engine for arbitrary executables.|https://github.com/a0rtega/metame objdump2shellcode|28.c2d6120|A tool I have found incredibly useful whenever creating custom shellcode.|https://github.com/wetw0rk/objdump2shellcode oledump|0.0.63|Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.|http://blog.didierstevens.com/programs/oledump-py/ @@ -46,7 +46,7 @@ packerid|1.4|Script which uses a PEiD database to identify which packer (if any) patchkit|37.95dc699|Powerful binary patching from Python.|https://github.com/lunixbochs/patchkit pixd|7.873db72|Colourful visualization tool for binary files.|https://github.com/FireyFly/pixd powerstager|14.0149dc9|A payload stager using PowerShell.|https://github.com/z0noxz/powerstager -procdump|53.7ae6126|Generate coredumps based off performance triggers.|https://github.com/Microsoft/ProcDump-for-Linux +procdump|54.569883d|Generate coredumps based off performance triggers.|https://github.com/Microsoft/ProcDump-for-Linux proctal|482.67bf7e8|Provides a command line interface and a C library to manipulate the address space of a running program on Linux.|https://github.com/daniel-araujo/proctal python-oletools|0.60|Tools to analyze Microsoft OLE2 files.|https://pypi.org/project/oletools/ python2-oletools|0.60|Tools to analyze Microsoft OLE2 files.|https://pypi.org/project/oletools/ @@ -59,7 +59,7 @@ soot|3.4.0|A Java Bytecode Analysis and Transformation Framework.|http://www.sab strace|5.17|A diagnostic, debugging and instructional userspace tracer|https://strace.io/ stringsifter|29.3cb284a|Machine learning tool that automatically ranks strings based on their relevance for malware analysis.|https://github.com/fireeye/stringsifter swftools|0.9.2|A collection of SWF manipulation and creation utilities.|http://www.swftools.org/ -triton|3713.243026c9|A Dynamic Binary Analysis (DBA) framework.|https://github.com/JonathanSalwan/Triton +triton|3756.c82b6eb0|A Dynamic Binary Analysis (DBA) framework.|https://github.com/JonathanSalwan/Triton upx|3.96|Extendable, high-performance executable packer for several executable formats|https://github.com/upx/upx valgrind|3.19.0|Tool to help find memory-management problems in programs|http://valgrind.org/ veles|637.e65de5a|New open source tool for binary data analysis.|https://codisec.com/veles/ diff --git a/data/bluetooth b/data/bluetooth index 7971e205..e071d84f 100644 --- a/data/bluetooth +++ b/data/bluetooth @@ -16,7 +16,7 @@ btlejack|84.4e3014f|Bluetooth Low Energy Swiss-army knife.|https://github.com/vi btproxy-mitm|71.cd1c906|Man in the Middle analysis tool for Bluetooth.|https://github.com/conorpp/btproxy btscanner|2.1|Bluetooth device scanner.|http://www.pentest.co.uk carwhisperer|0.2|Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.|http://trifinite.org/trifinite_stuff_carwhisperer.html -ghettotooth|1.0|Ghettodriving for bluetooth|http://www.oldskoolphreak.com/tfiles/ghettotooth.txt +ghettotooth|1.0|Ghettodriving for bluetooth.|http://www.oldskoolphreak.com/tfiles/ghettotooth.txt hidattack|0.1|HID Attack (attacking HID host implementations)|http://mulliner.org/bluetooth/hidattack.php obexstress|0.1|Script for testing remote OBEX service for some potential vulnerabilities.|http://bluetooth-pentest.narod.ru/ redfang|2.5|Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().|http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html diff --git a/data/code-audit b/data/code-audit index ef772e45..e4d9ef4d 100644 --- a/data/code-audit +++ b/data/code-audit @@ -1,9 +1,9 @@ bof-detector|19.e08367d|A simple detector of BOF vulnerabilities by source-code-level check.|https://github.com/st9140927/BOF_Detector -brakeman|3801.c6237463e|A static analysis security vulnerability scanner for Ruby on Rails applications.|https://brakemanscanner.org/ +brakeman|3805.26735dd99|A static analysis security vulnerability scanner for Ruby on Rails applications.|https://brakemanscanner.org/ cflow|1.7|A C program flow analyzer.|http://www.gnu.org/software/cflow/ cppcheck|2.8|A tool for static C/C++ code analysis|http://cppcheck.sourceforge.net/ cpptest|2.0.0|A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.|https://github.com/cpptest/cpptest/releases -detect-secrets|v1.2.0.r21.ge8426a4|An enterprise friendly way of detecting and preventing secrets in code.|https://github.com/Yelp/detect-secrets +detect-secrets|v1.2.0.r23.g3c8ee74|An enterprise friendly way of detecting and preventing secrets in code.|https://github.com/Yelp/detect-secrets devaudit|803.ca0a68e|An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams.|https://github.com/sonatype-nexus-community/DevAudit dscanner|0.12.1|Swiss-army knife for D source code|https://github.com/dlang-community/D-Scanner flawfinder|2.0.19|Searches through source code for potential security flaws|https://dwheeler.com/flawfinder/ @@ -12,14 +12,14 @@ local-php-security-checker|v2.0.3.r0.g5a963b3|A command line tool that checks yo mosca|112.7d33611|Static analysis tool to find bugs like a grep unix command.|https://github.com/CoolerVoid/Mosca njsscan|0.3.1|A static application testing (SAST) tool that can find insecure code patterns in your node.js applications.|https://pypi.org/project/njsscan/#files pfff|0.29|Tools and APIs for code analysis, visualization and transformation|https://github.com/facebook/pfff -phpstan|7600.c84e0d402|PHP Static Analysis Tool - discover bugs in your code without running it.|https://github.com/phpstan/phpstan +phpstan|7702.22e755948|PHP Static Analysis Tool - discover bugs in your code without running it.|https://github.com/phpstan/phpstan pscan|1.3|A limited problem scanner for C source files|http://deployingradius.com/pscan/ rats|6.4ba54ce|A rough auditing tool for security in source code files.|https://github.com/andrew-d/rough-auditing-tool-for-security shellcheck|0.8.0|Shell script analysis tool|https://www.shellcheck.net slither|2555.fba37f2c|Solidity static analysis framework written in Python 3.|https://github.com/crytic/slither snyk|1.878.0|CLI and build-time tool to find and fix known vulnerabilities in open-source dependencies.|https://github.com/snyk/snyk splint|3.1.2.git20180129|A tool for statically checking C programs for security vulnerabilities and coding mistakes|https://repo.or.cz/splint-patched.git -spotbugs|16787.68e7dca67|A tool for static analysis to look for bugs in Java code.|https://github.com/spotbugs/spotbugs +spotbugs|16788.7ba0e74fa|A tool for static analysis to look for bugs in Java code.|https://github.com/spotbugs/spotbugs stoq|769.8bfc78b|An open source framework for enterprise level automated analysis.|https://github.com/PUNCH-Cyber/stoq tell-me-your-secrets|v.2.4.0.r1.gd7d2e74|Find secrets on any machine from over 120 Different Signatures.|https://github.com/valayDave/tell-me-your-secrets trufflehog|213.e9ac138|Searches through git repositories for high entropy strings, digging deep into commit history.|https://github.com/dxa4481/truffleHog diff --git a/data/cracker b/data/cracker index bc3e5daf..8c5c43cb 100644 --- a/data/cracker +++ b/data/cracker @@ -136,7 +136,7 @@ skul|27.7bd83f1|A PoC to bruteforce the Cryptsetup implementation of Linux Unifi smbbf|0.9.1|SMB password bruteforcer.|http://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html snmp-brute|19.830bb0a|SNMP brute force, enumeration, CISCO config downloader and password cracking script.|https://github.com/SECFORCE/SNMP-Brute speedpwn|8.3dd2793|An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.|https://gitorious.org/speedpwn/ -spray365|31.8a339b7|Makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach.|https://github.com/MarkoH17/Spray365 +spray365|40.342fbf0|Makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach.|https://github.com/MarkoH17/Spray365 spraycharles|192.5a76852|Low and slow password spraying tool, designed to spray on an interval over a long period of time.|https://github.com/Tw1sm/spraycharles sqlpat|1.0.1|This tool should be used to audit the strength of Microsoft SQL Server passwords offline.|http://www.cqure.net/wp/sqlpat/ ssh-privkey-crack|0.4|A SSH private key cracker.|https://code.google.com/p/lusas/ @@ -152,7 +152,7 @@ tftp-bruteforce|0.1|A fast TFTP filename bruteforcer written in perl.|http://www thc-keyfinder|1.0|Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.|https://www.thc.org/releases.php thc-pptp-bruter|0.1.4|A brute force program that works against pptp vpn endpoints (tcp port 1723).|http://www.thc.org thc-smartbrute|1.0|This tool finds undocumented and secret commands implemented in a smartcard.|https://www.thc.org/thc-smartbrute/ -trevorspray|108.a9d765b|A modular password sprayer with threading, clever proxying, loot modules, and more!|https://github.com/blacklanternsecurity/TREVORspray +trevorspray|109.f128ffe|A modular password sprayer with threading, clever proxying, loot modules, and more!|https://github.com/blacklanternsecurity/TREVORspray truecrack|35|Password cracking for truecrypt(c) volumes.|http://code.google.com/p/truecrack/ tweetshell|21.47a415c|Multi-thread Twitter BruteForcer in Shell Script.|https://github.com/thelinuxchoice/tweetshell ufo-wardriving|4|Allows you to test the security of wireless networks by detecting their passwords based on the router model.|http://www.ufo-wardriving.com/ diff --git a/data/crypto b/data/crypto index ee709fc2..a4ec7b1f 100644 --- a/data/crypto +++ b/data/crypto @@ -60,7 +60,7 @@ ssdeep|2.14.1|A program for computing context triggered piecewise hashes|https:/ sslyze|5.0.3|Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations.|https://github.com/nabla-c0d3/sslyze testssl.sh|3.0.7|Testing TLS/SSL encryption|https://github.com/drwetter/testssl.sh tls-attacker|5759.973f490a3|A Java-based framework for analyzing TLS libraries.|https://github.com/RUB-NDS/TLS-Attacker -tls-map|v2.1.0.r7.g08bbd0b|CLI & library for TLS cipher suites manipulation.|https://noraj.github.io/tls-map/ +tls-map|v2.1.0.r9.g52c4704|CLI & library for TLS cipher suites manipulation.|https://noraj.github.io/tls-map/ tlsenum|78.787c88b|A command line tool to enumerate TLS cipher-suites supported by a server.|https://github.com/Ayrx/tlsenum tlsfuzzer|1382.0f7c53e|SSL and TLS protocol test suite and fuzzer.|https://github.com/tomato42/tlsfuzzer tlspretense|v0.6.2.r22.g0a5faf4|SSL/TLS client testing framework.|https://github.com/iSECPartners/tlspretense diff --git a/data/debugger b/data/debugger index 03ecb565..0a259420 100644 --- a/data/debugger +++ b/data/debugger @@ -3,14 +3,14 @@ electric-fence|2.2.5|A malloc(3) debugger that uses virtual memory hardware to d gdb|12.1|The GNU Debugger|https://www.gnu.org/software/gdb/ gdb-common|12.1|The GNU Debugger|https://www.gnu.org/software/gdb/ gdbgui|429.799d340|Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust.|https://github.com/cs01/gdbgui -gef|2259.e50af77|Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.|https://github.com/hugsy/gef +gef|2260.7f45550|Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.|https://github.com/hugsy/gef heaptrace|2.2.8.2.r19.g6f66cad|Helps visualize heap operations for pwn and debugging.|https://github.com/Arinerron/heaptrace lldb|13.0.1|Next generation, high-performance debugger|https://lldb.llvm.org/ ollydbg|201g|A 32-bit assembler-level analysing debugger.|http://www.ollydbg.de peda|1.2|Python Exploit Development Assistance for GDB|https://github.com/longld/peda pwndbg|2022.01.05|Makes debugging with GDB suck less|https://github.com/pwndbg/pwndbg -rr|6000.c95a2d5e|A Record and Replay Framework.|https://github.com/mozilla/rr +rr|6009.68fe9b74|A Record and Replay Framework.|https://github.com/mozilla/rr saleae-logic|2.3.47|Debug happy.|https://www.saleae.com/downloads shellnoob|35.72cf498|A toolkit that eases the writing and debugging of shellcode.|https://github.com/reyammer/shellnoob -vivisect|1699.c1765319|A Python based static analysis and reverse engineering framework.|http://visi.kenshoto.com/ +vivisect|1701.b8565c50|A Python based static analysis and reverse engineering framework.|http://visi.kenshoto.com/ voltron|627.d9fef0b|UI for GDB, LLDB and Vivisect's VDB.|https://github.com/snare/voltron diff --git a/data/decompiler b/data/decompiler index 183f718a..9f630f32 100644 --- a/data/decompiler +++ b/data/decompiler @@ -4,7 +4,7 @@ cafebabe|0.1.2|Java bytecode editor & decompiler.|https://grax.info/ cfr|152|Another Java decompiler.|http://www.benf.org/other/cfr/ fernflower|485.e19aab6|An analytical decompiler for Java.|https://github.com/fesh0r/fernflower gadgetinspector|6.ac7832d|A byte code analyzer for finding deserialization gadget chains in Java applications.|https://github.com/JackOfMostTrades/gadgetinspector -jadx|1.4.0|Command line and GUI tools to produce Java source code from Android Dex and APK files|https://github.com/skylot/jadx +jadx|1.4.1|Command line and GUI tools to produce Java source code from Android Dex and APK files|https://github.com/skylot/jadx jd-cli|1.2.0|Command line Java Decompiler.|https://github.com/kwart/jd-cli jd-gui|1.6.6|A standalone graphical utility that displays Java source codes of .class files.|https://github.com/java-decompiler/jd-gui jpexs-decompiler|15.1.0|JPEXS Free Flash Decompiler.|https://github.com/jindrapetrik/jpexs-decompiler diff --git a/data/defensive b/data/defensive index 3dc2b2bd..a921a48e 100644 --- a/data/defensive +++ b/data/defensive @@ -10,13 +10,13 @@ fastnetmon|v1.1.4.r62.g780aff3|High performance DoS/DDoS load analyzer built on fssb|73.51d2ac2|A low-level filesystem sandbox for Linux using syscall intercepts.|https://github.com/adtac/fssb honeycreds|26.eaeb401|Network credential injection to detect responder and other network poisoners.|https://github.com/Ben0xA/HoneyCreds ifchk|1.1.2|A network interface promiscuous mode detection tool.|http://www.noorg.org/ifchk/ -inetsim|1.3.2|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.|http://www.inetsim.org +inetsim|1.3.2|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.|http://www.inetsim.org/ jeopardize|5.34f1d07|A low(zero) cost threat intelligence & response tool against phishing domains.|https://github.com/utkusen/jeopardize jhead|3.06.0.1|EXIF JPEG info parser and thumbnail remover|http://www.sentex.net/~mwandel/jhead/ lorg|98.aa4f1a3|Apache Logfile Security Analyzer.|https://github.com/jensvoid/lorg malice|0.3.28|VirusTotal Wanna Be - Now with 100% more Hipster.|https://github.com/maliceio/malice malmon|0.3|Hosting exploit/backdoor detection daemon.|http://sourceforge.net/projects/malmon/ -maltrail|76653.8bbaac57f1|Malicious traffic detection system.|https://github.com/stamparm/maltrail +maltrail|77078.8a1cd3d0fe|Malicious traffic detection system.|https://github.com/stamparm/maltrail mat|0.6.1|Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.|https://mat.boum.org/ mat2|0.12.4|Metadata removal tool, supporting a wide range of commonly used file formats|https://0xacab.org/jvoisin/mat2 munin-hashchecker|223.5ddf3a7|Online hash checker for Virustotal and other services|https://github.com/Neo23x0/munin @@ -25,18 +25,18 @@ onionshare|2.5|Share a file over Tor Hidden Services anonymously and securely|ht orjail|200.ae38ba2|A more secure way to force programs to exclusively use tor network.|https://github.com/orjail/orjail osfooler-ng|2.c0b20d6|Prevents remote active/passive OS fingerprinting by tools like nmap or p0f.|https://github.com/segofensiva/OSfooler-ng portspoof|128.8b5596a|This program's primary goal is to enhance OS security through a set of new techniques.|http://portspoof.org/ -prowler|1898.d307898|Tool for AWS security assessment, auditing and hardening.|https://github.com/alfresco/prowler +prowler|1919.7930b44|Tool for AWS security assessment, auditing and hardening.|https://github.com/alfresco/prowler quicksand-lite|32.42af152|Command line tool for scanning streams within office documents plus xor db attack.|https://github.com/tylabs/quicksand_lite sigma|0.20|Generic Signature Format for SIEM Systems|https://github.com/SigmaHQ/sigma/releases sniffjoke|772.434bfb1|Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.|http://www.delirandom.net/sniffjoke/ snort|2.9.19|A lightweight network intrusion detection system.|http://www.snort.org/ sooty|326.e1e86e5|The SOC Analysts all-in-one CLI tool to automate and speed up workflow.|https://github.com/TheresAFewConors/Sooty -suricata|6.0.4|An Open Source Next Generation Intrusion Detection and Prevention Engine.|https://suricata-ids.org/ +suricata|6.0.5|An Open Source Next Generation Intrusion Detection and Prevention Engine.|https://suricata.io/download/ tabi|13.068a406|BGP Hijack Detection.|https://github.com/ANSSI-FR/tabi -tfsec|v0.63.1.r271.g85e55a9bf|Security scanner for your Terraform code.|https://github.com/aquasecurity/tfsec +tfsec|v0.63.1.r287.g931567b60|Security scanner for your Terraform code.|https://github.com/aquasecurity/tfsec threatspec|0.5.0|Project to integrate threat modelling into development process.|https://github.com/threatspec/threatspec tor-autocircuit|0.2|Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.|http://www.thesprawl.org/projects/tor-autocircuit/ -tor-browser-en|11.0.11|Tor Browser Bundle: anonymous browsing using Firefox and Tor.|https://www.torproject.org/projects/torbrowser.html.en +tor-browser-en|11.0.13|Tor Browser Bundle: anonymous browsing using Firefox and Tor.|https://www.torproject.org/projects/torbrowser.html.en tor-router|4.001a510|A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.|https://github.com/Edu4rdSHL/tor-router truecrypt|7.1a|Free open-source cross-platform disk encryption software|http://www.truecrypt.org/ tyton|80.56494f3|Kernel-Mode Rootkit Hunter.|https://github.com/nbulischeck/tyton diff --git a/data/exploitation b/data/exploitation index 604bcb32..23549264 100644 --- a/data/exploitation +++ b/data/exploitation @@ -1,7 +1,7 @@ aclpwn|4.81480cc|Active Directory ACL exploitation with BloodHound.|https://github.com/fox-it/aclpwn.py adenum|29.0e3576e|A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.|https://github.com/SecuProject/ADenum aggroargs|51.c032446|Bruteforce commandline buffer overflows, linux, aggressive arguments.|https://github.com/tintinweb/aggroArgs -angrop|212.c1e859b|A rop gadget finder and chain builder.|https://github.com/salls/angrop +angrop|214.5fb6634|A rop gadget finder and chain builder.|https://github.com/salls/angrop armitage|150813|A graphical cyber attack management tool for Metasploit.|http://www.fastandeasyhacking.com/ armor|5.bae27a6|A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.|https://github.com/tokyoneon/Armor armscgen|98.c51b7d6|ARM Shellcode Generator (Mostly Thumb Mode).|https://github.com/alexpark07/ARMSCGen @@ -11,7 +11,7 @@ backoori|55.988e507|Tool aided persistence via Windows URI schemes abuse.|https: bad-pdf|61.a8149ee|Steal NTLM Hashes with Bad-PDF.|https://github.com/deepzec/Bad-Pdf barq|35.6f1a68c|An AWS Cloud Post Exploitation framework.|https://github.com/Voulnet/barq bed|0.5|Collection of scripts to test for buffer overflows, format string vulnerabilities.|http://www.aldeid.com/wiki/Bed -beef|4047.cbe9f669|The Browser Exploitation Framework that focuses on the web browser.|http://beefproject.com/ +beef|4048.a7a4c814|The Browser Exploitation Framework that focuses on the web browser.|http://beefproject.com/ bfbtester|2.0.1|Performs checks of single and multiple argument command line overflows and environment variable overflows|http://sourceforge.net/projects/bfbtester/ binex|1.0|Format String exploit building tool.|http://www.morxploit.com/morxtool bitdump|34.6a5cbd8|A tool to extract database data from a blind SQL injection vulnerability.|https://github.com/nbshelton/bitdump @@ -20,11 +20,11 @@ bluffy|46.3f6ec81|Convert shellcode into different formats.|https://github.com/a botb|69.6d33aae|A container analysis and exploitation tool for pentesters and engineers.|https://github.com/brompwnie/botb bowcaster|230.17d69c1|A framework intended to aid those developing exploits.|https://github.com/zcutlip/bowcaster brosec|278.c51164f|An interactive reference tool to help security professionals utilize useful payloads and commands.|https://github.com/gabemarshall/Brosec -camover|72.2afe39f|A camera exploitation tool that allows to disclosure network camera admin password.|https://github.com/EntySec/camover +camover|73.abcded1|A camera exploitation tool that allows to disclosure network camera admin password.|https://github.com/EntySec/camover chw00t|39.1fd1016|Unices chroot breaking tool.|https://github.com/earthquake/chw00t cisco-global-exploiter|1.3|A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.|http://www.blackangels.it cisco-torch|0.4b|Cisco Torch mass scanning, fingerprinting, and exploitation tool.|https://github.com/foreni-packages/cisco-torch/ -cve-search|v4.2.r40.gae4b26e|A tool to perform local searches for known vulnerabilities.|http://cve-search.github.io/cve-search +cve-search|v4.2.1.r0.gb99da1a|A tool to perform local searches for known vulnerabilities.|http://cve-search.github.io/cve-search darkd0rk3r|1.0|Python script that performs dork searching and searches for local file inclusion and SQL injection errors.|http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html darkmysqli|1.6|Multi-Purpose MySQL Injection Tool|https://github.com/BlackArch/darkmysqli darkspiritz|6.4d23e94|A penetration testing framework for Linux, MacOS, and Windows systems.|https://github.com/M4cs/DarkSpiritz @@ -81,7 +81,7 @@ limelighter|17.d119dc7|A tool for generating fake code signing certificates or s lisa.py|61.2d1f81a|An Exploit Dev Swiss Army Knife.|https://github.com/ant4g0nist/lisa.py m3-gen|7.7c656cc|Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose.|https://github.com/infosecn1nja/MaliciousMacroMSBuild marshalsec|10.2dc4018|Java Unmarshaller Security - Turning your data into code execution.|https://github.com/mbechler/marshalsec/ -metasploit|6.1.35|Advanced open-source platform for developing, testing, and using exploit code|https://www.metasploit.com/ +metasploit|6.2.0|Advanced open-source platform for developing, testing, and using exploit code|https://www.metasploit.com/ minimysqlator|0.5|A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.|http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r miranda-upnp|1.3|A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices|http://code.google.com/p/miranda-upnp/ mitmf|467.0458300|A Framework for Man-In-The-Middle attacks written in Python.|https://github.com/byt3bl33d3r/MITMf @@ -107,13 +107,13 @@ pocsuite|430.877d1b1|An open-sourced remote vulnerability testing framework deve pompem|141.3ebe768|A python exploit tool finder.|https://github.com/rfunix/Pompem powersploit|591.d943001|A PowerShell Post-Exploitation Framework.|https://github.com/mattifestation/PowerSploit preeny|110.aaef77f|Some helpful preload libraries for pwning stuff.|https://github.com/zardus/preeny -pret|100.a5dd92f|Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.|https://github.com/RUB-NDS/PRET +pret|102.638caad|Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.|https://github.com/RUB-NDS/PRET ps1encode|41.68d7778|A tool to generate and encode a PowerShell based Metasploit payloads.|https://github.com/CroweCybersecurity/ps1encode ptf|1480.a70d1ba|The Penetration Testers Framework: Way for modular support for up-to-date tools.|https://github.com/trustedsec/ptf punk|9.c2bc420|A post-exploitation tool meant to help network pivoting from a compromised unix box.|https://github.com/r3vn/punk.py pwncat-caleb|v0.5.4.r11.g37f04d4|A post-exploitation platform.|https://github.com/calebstewart/pwncat pykek|12.651b9ba|Kerberos Exploitation Kit.|https://github.com/bidord/pykek -python-ssh-mitm|2.0.0|SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation.|https://pypi.org/project/ssh-mitm/#files +python-ssh-mitm|2.0.3|SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation.|https://pypi.org/project/ssh-mitm/#files python2-ropgadget|5.9|Pythonic argument parser, that will make you smile.|https://pypi.org/project/ropgadget/#files rebind|0.3.4|DNS Rebinding Tool|http://code.google.com/p/rebind/ rex|663.155a0bd|Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.|https://github.com/shellphish/rex @@ -121,7 +121,7 @@ rext|63.5f0f626|Router EXploitation Toolkit - small toolkit for easy creation an rfcat|170508|RF ChipCon-based Attack Toolset.|http://code.google.com/p/rfcat richsploit|3.6b15e0f|Exploitation toolkit for RichFaces.|https://github.com/redtimmy/Richsploit rmiscout|1.4|Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities.|https://github.com/BishopFox/rmiscout -rombuster|184.aefb0ef|A router exploitation tool that allows to disclosure network router admin password.|https://github.com/EntySec/RomBuster +rombuster|194.93f4fe4|A router exploitation tool that allows to disclosure network router admin password.|https://github.com/EntySec/RomBuster ropeme|4.9b3a8fd|A set of python scripts to generate ROP gadgets and payload.|http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/ ropgadget|6.7|Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures|http://www.shell-storm.org/project/ROPgadget ropper|1.13.7|Show information about binary files and find gadgets to build rop chains for different architectures|https://github.com/sashs/Ropper @@ -166,14 +166,14 @@ viproy-voipkit|82.52b27db|VoIP Pen-Test Kit for Metasploit Framework.|http://vip vmap|0.3|A Vulnerability-Exploit desktop finder.|https://github.com/git-rep/vmap webexploitationtool|155.85bcf0e|A cross platform web exploitation toolkit.|https://github.com/AutoSecTools/WebExploitationTool websploit|4.0.4|An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks|https://github.com/websploit/websploit -wesng|233.5c241fa|Windows Exploit Suggester - Next Generation.|https://github.com/bitsadmin/wesng +wesng|235.3fca87d|Windows Exploit Suggester - Next Generation.|https://github.com/bitsadmin/wesng wildpwn|11.4623714|Unix wildcard attacks.|https://github.com/localh0t/wildpwn wsuspect-proxy|24.89f9375|A tool for MITM'ing insecure WSUS connections.|https://github.com/ctxis/wsuspect-proxy xcat|266.faaf8fe|A command line tool to automate the exploitation of blind XPath injection vulnerabilities.|https://github.com/orf/xcat xpl-search|42.d4dbc97|Search exploits in multiple exploit databases!.|https://github.com/CoderPirata/XPL-SEARCH xrop|83.4af7452|Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC.|https://github.com/acama/xrop xxeinjector|55.604c39a|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|https://github.com/enjoiz/XXEinjector -xxexploiter|101.c0c54d2|It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration.|https://github.com/luisfontes19/xxexploiter +xxexploiter|103.c1f0f41|It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration.|https://github.com/luisfontes19/xxexploiter yinjector|0.1|A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.|http://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html zarp|0.1.8|A network attack tool centered around the exploitation of local networks.|https://defense.ballastsecurity.net/wiki/index.php/Zarp zeratool|42.a541336|Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems.|https://github.com/ChrisTheCoolHut/Zeratool diff --git a/data/fingerprint b/data/fingerprint index 4a751799..0d6bc956 100644 --- a/data/fingerprint +++ b/data/fingerprint @@ -19,7 +19,7 @@ operative|147.4448b19|Framework based on fingerprint action, this tool is used f p0f|3.09b|Purely passive TCP/IP traffic fingerprinting tool|http://lcamtuf.coredump.cx/p0f3/ propecia|2|A fast class scanner that scans for a specified open port with banner grabbing|http://www.redlevel.org scannerl|15.e52c46b|The modular distributed fingerprinting engine.|https://github.com/kudelskisecurity/scannerl -sinfp|1.24|A full operating system stack fingerprinting suite.|http://www.networecon.com/tools/sinfp/ +sinfp|1.24|A full operating system stack fingerprinting suite.|https://cpan.metacpan.org/authors/id/G/GO/GOMOR/ smtpmap|0.8.234_BETA|Tool to identify the running smtp software on a given host.|http://www.projectiwear.org/~plasmahh/software.html smtpscan|0.5|An SMTP scanner|http://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html spartan|23.babdd7d|Frontpage and Sharepoint fingerprinting and attack tool.|https://github.com/sensepost/SPartan diff --git a/data/forensic b/data/forensic index 1febb55d..82426df2 100644 --- a/data/forensic +++ b/data/forensic @@ -16,7 +16,7 @@ dc3dd|7.2.646|A patched version of dd that includes a number of features useful dcfldd|1.7.1|DCFL (DoD Computer Forensics Lab) dd replacement with hashing.|https://github.com/resurrecting-open-source-projects/dcfldd/ ddrescue|1.26|GNU data recovery tool|https://www.gnu.org/software/ddrescue/ddrescue.html dfir-ntfs|1.1.13|An NTFS parser for digital forensics & incident response.|https://github.com/msuhanov/dfir_ntfs -dftimewolf|472.fe013850|Framework for orchestrating forensic collection, processing and data export .|https://github.com/log2timeline/dftimewolf +dftimewolf|481.cf2702bd|Framework for orchestrating forensic collection, processing and data export .|https://github.com/log2timeline/dftimewolf disitool|0.4|Tool to work with Windows executables digital signatures.|https://blog.didierstevens.com/my-software/#disitool dmde|3.8.0.790|Disk Editor and Data Recovery Software.|https://dmde.com/download.html dmg2img|1.6.7|A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format|http://vu1tur.eu.org/tools/ diff --git a/data/fuzzer b/data/fuzzer index 4325a2f1..cf156c9d 100644 --- a/data/fuzzer +++ b/data/fuzzer @@ -1,4 +1,4 @@ -aflplusplus|4.00c.r217.ga2eb1f14|American Fuzzing Lop fuzzer with community patches and additional features.|https://aflplus.plus/ +aflplusplus|4.00c.r226.gba3c7bfe|American Fuzzing Lop fuzzer with community patches and additional features.|https://aflplus.plus/ ajpfuzzer|0.6|A command-line fuzzer for the Apache JServ Protocol (ajp13).|https://github.com/doyensec/ajpfuzzer backfuzz|1.b0648de|A network protocol fuzzing toolkit.|https://github.com/localh0t/backfuzz bfuzz|59.e82cbf4|Input based fuzzer tool for browsers.|https://github.com/RootUp/BFuzz diff --git a/data/hardware b/data/hardware index 08892410..bea368d7 100644 --- a/data/hardware +++ b/data/hardware @@ -1,5 +1,5 @@ arduino|1.8.19|Arduino prototyping platform SDK|https://github.com/arduino/Arduino -chipsec|1485.c8049969|Platform Security Assessment Framework.|https://github.com/chipsec/chipsec +chipsec|1496.ad358086|Platform Security Assessment Framework.|https://github.com/chipsec/chipsec dex2jar|2.1|A tool for converting Android's .dex format to Java's .class format|http://code.google.com/p/dex2jar hdmi-sniff|5.f7fbc0e|HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.|https://github.com/ApertureLabsLtd/hdmi-sniff kautilya|52.1c9d5b0|Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.|https://github.com/samratashok/Kautilya/releases diff --git a/data/misc b/data/misc index afb9b1c9..5d01615a 100644 --- a/data/misc +++ b/data/misc @@ -12,7 +12,7 @@ cloakify|117.f45c3b3|Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; So cracken|v1.0.1.r0.g7a325ff|A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust.|https://github.com/shmuelamar/cracken credmap|116.d862247|The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse.|https://github.com/lightos/credmap crosstool-ng|1.25.0|A versatile (cross-)toolchain generator|https://crosstool-ng.github.io/ -ctf-party|v2.1.0.r14.ge67f355|A CLI tool & library to enhance and speed up script/exploit writing for CTF players.|https://noraj.github.io/ctf-party/ +ctf-party|v2.1.0.r16.g41dc61d|A CLI tool & library to enhance and speed up script/exploit writing for CTF players.|https://noraj.github.io/ctf-party/ cve-api|170.8e9c247|Unofficial api for cve.mitre.org.|https://github.com/Beyarz/Cve-api dbd|61.8cf5350|A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.|https://github.com/gitdurandal/dbd densityscout|45|Calculates density for files of any file-system-path to finally output an accordingly descending ordered list.|https://www.cert.at/en/downloads/software/software-densityscout @@ -25,7 +25,7 @@ duplicut|2.2|Remove duplicates from massive wordlist, without sorting it (for di elettra|1.0|Encryption utility by Julia Identity|http://www.winstonsmith.info/julia/elettra/ elettra-gui|1.0|Gui for the elettra crypto application.|http://www.winstonsmith.info/julia/elettra/ ent|1.0|Pseudorandom number sequence test.|http://www.fourmilab.ch/random -evilgrade|2.0.9|Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.|http://www.infobyte.com.ar/developments.html +evilgrade|2.0.9|Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.|https://github.com/infobyte/evilgrade exrex|144.9a66706|Irregular methods on regular expressions.|https://github.com/asciimoo/exrex extracthosts|17.8fdff9e|Extracts hosts (IP/Hostnames) from files.|https://github.com/bwall/ExtractHosts eyeballer|137.d1d5182|Convolutional neural network for analyzing pentest screenshots.|https://github.com/BishopFox/eyeballer @@ -54,29 +54,29 @@ hurl|20.afca9c5|Hexadecimal & URL (en/de)coder.|https://github.com/fnord0/hURL hxd|2.5.0.0|Freeware Hex Editor and Disk Editor.|https://mh-nexus.de/en/hxd/ imagegrep|8.1f14af2|Grep word in pdf or image based on OCR.|https://github.com/coderofsalvation/imagegrep-bash imhex|1.16.2.r9.g3da1b3f0|A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.|https://github.com/WerWolv/ImHex -intelmq|3.0.2.r153.g0221a2507|A tool for collecting and processing security feeds using a message queuing protocol.|https://github.com/certtools/intelmq +intelmq|3.0.2.r161.g79cae294a|A tool for collecting and processing security feeds using a message queuing protocol.|https://github.com/certtools/intelmq intensio-obfuscator|280.f66a22b|Obfuscate a python code 2 and 3.|https://github.com/Hnfull/Intensio-Obfuscator inundator|0.5|An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.|http://inundator.sourceforge.net/ ipcountry|1.2|Fetches IPv4 ranges of given country in host and cidr format.|https://nullsecurity.net/tools/misc.html ipobfuscator|26.0a7f802|A simple tool to convert the IP to a DWORD IP.|https://github.com/OsandaMalith/IPObfuscator jsfuck|228.1f02651|Write any JavaScript with 6 Characters: []()!+.|https://github.com/aemkei/jsfuck laudanum|1.0|A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.|http://laudanum.inguardians.com/# -leo|27765.3f774b09f|Literate programmer's editor, outliner, and project manager.|https://github.com/leo-editor/leo-editor/ +leo|28087.1731c35d8|Literate programmer's editor, outliner, and project manager.|https://github.com/leo-editor/leo-editor/ libpst|0.6.76|Outlook .pst file converter|https://www.five-ten-sg.com/libpst/ magictree|1.3|A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation|http://www.gremwell.com metaforge|115.7b32693|Auto Scanning to SSL Vulnerability.|https://github.com/chriswmorris/Metaforge mibble|2.10.1|An open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.|http://www.mibble.org/ minimodem|353.bb2f34c|A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols.|https://github.com/kamalmostafa/minimodem mkyara|3.8147f91|Tool to generate YARA rules based on binary code.|https://github.com/fox-it/mkYARA -mrtparse|518.a9081fc|A module to read and analyze the MRT format data.|https://github.com/YoshiyukiYamauchi/mrtparse +mrtparse|519.9fa94ea|A module to read and analyze the MRT format data.|https://github.com/YoshiyukiYamauchi/mrtparse msfdb|16.09c603b|Manage the metasploit framework database.|https://github.com/BlackArch/msfdb narthex|v1.2.r7.g8b78746|Modular personalized dictionary generator.|https://github.com/MichaelDim02/Narthex nmap-parse-output|23.6405abf|Converts/manipulates/extracts data from a nmap scan output.|https://github.com/hahwul/nmap-parse-output nsearch|353.bd8205b|Minimal script to help find script into the nse database.|https://github.com/JKO/nsearch one-lin3r|63.9fdfa5f|Gives you one-liners that aids in penetration testing and more.|https://github.com/D4Vinci/One-Lin3r -open-iscsi|2.1.6|iSCSI userland tools|https://www.open-iscsi.com/ +open-iscsi|2.1.7|iSCSI userland tools|https://www.open-iscsi.com/ pass-station|v1.3.0.r3.ga63a26f|CLI & library to search for default credentials among thousands of Products / Vendors.|https://noraj.github.io/pass-station/ -payloadsallthethings|1402.12ee527|A list of useful payloads and bypass for Web Application Security and Pentest/CTF.|https://github.com/swisskyrepo/PayloadsAllTheThings/ +payloadsallthethings|1407.3066615|A list of useful payloads and bypass for Web Application Security and Pentest/CTF.|https://github.com/swisskyrepo/PayloadsAllTheThings/ pdfwalker|7.64c17f0|Frontend to explore the internals of a PDF document with Origami|https://github.com/gdelugre/pdfwalker pencode|32.47e5784|Complex payload encoder.|https://github.com/ffuf/pencode plumber.py|18.3f1be68|A python implementation of a grep friendly ftrace wrapper.|https://github.com/cybereason/linux_plumber @@ -108,7 +108,7 @@ shelling|227.0a6c135|An offensive approach to the anatomy of improperly written sleuthql|9.29fc878|Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.|https://github.com/RhinoSecurityLabs/SleuthQL sslcat|1.0|SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.|http://www.bindshell.net/tools/sslcat stompy|0.0.4|An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.|http://lcamtuf.coredump.cx/ -suricata-verify|736.fa5a4ac|Suricata Verification Tests - Testing Suricata Output.|https://github.com/OISF/suricata-verify +suricata-verify|743.ec41a13|Suricata Verification Tests - Testing Suricata Output.|https://github.com/OISF/suricata-verify tcpxtract|1.0.1|A tool for extracting files from network traffic.|http://tcpxtract.sourceforge.net tempomail|25.3ca0fcf|Tool to create a temporary email address in 1 Second and receive emails.|https://github.com/kavishgr/tempomail tnscmd|1.3|A lame tool to prod the oracle tnslsnr process (1521/tcp).|http://www.jammed.com/~jwa/hacks/security/tnscmd/ @@ -124,7 +124,7 @@ verinice|1.19.1.r1.gf82b192a6|Tool for managing information security.|https://gi vfeed|81.fad17ae|Open Source Cross Linked and Aggregated Local Vulnerability Database main repository.|http://www.toolswatch.org/vfeed visualize-logs|118.d2e370e|A Python library and command line tools to provide interactive log visualization.|https://github.com/keithjjones/visualize_logs web2ldap|1.7.6|Full-featured LDAP client running as web application.|https://web2ldap.de/ -whapa|346.5613389|WhatsApp Parser Tool.|https://github.com/B16f00t/whapa +whapa|354.605fd25|WhatsApp Parser Tool.|https://github.com/B16f00t/whapa whatportis|54.59a1718|A command to search port names and numbers.|https://github.com/ncrocfer/whatportis winexe|1.00|Remotely execute commands on Windows NT/2000/XP/2003 systems.|http://sourceforge.net/projects/winexe/ winregfs|150.c6da413|Windows Registry FUSE filesystem.|https://github.com/jbruchon/winregfs diff --git a/data/mobile b/data/mobile index 06794949..b8c4348a 100644 --- a/data/mobile +++ b/data/mobile @@ -2,7 +2,7 @@ androbugs|1.7fd3a2c|An efficient Android vulnerability scanner that helps develo androick|8.522cfb4|A python tool to help in forensics analysis on android.|https://github.com/Flo354/Androick android-ndk|r23.b|Android C/C++ developer kit|https://developer.android.com/sdk/ndk/index.html android-sdk|26.1.1|Google Android SDK|https://developer.android.com/studio/releases/sdk-tools.html -android-udev-rules|451.74801c6|Android udev rules.|https://github.com/bbqlinux/android-udev-rules +android-udev-rules|452.aa4a6d8|Android udev rules.|https://github.com/bbqlinux/android-udev-rules androidpincrack|2.ddaf307|Bruteforce the Android Passcode given the hash and salt.|https://github.com/PentesterES/AndroidPINCrack androidsniffer|0.1|A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.|http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html androwarn|135.626c02d|Yet another static code analyzer for malicious Android applications.|https://github.com/maaaaz/androwarn @@ -30,8 +30,8 @@ needle|579.891b660|The iOS Security Testing Framework.|https://github.com/mwrlab objection|1.11.0|Instrumented Mobile Pentest Framework.|https://pypi.org/project/objection/#files phonesploit|51.0193f9e|Adb exploiting tools.|https://github.com/metachar/PhoneSploit pyaxmlparser|v0.3.27.r0.g8da0929|A simple parser to parse Android XML file.|https://github.com/appknox/pyaxmlparser -python-frida-tools|10.6.1|Frida CLI tools.|https://pypi.org/project/frida-tools/#files -python2-frida-tools|10.6.1|Frida CLI tools.|https://pypi.org/project/frida-tools/#files +python-frida-tools|10.6.2|Frida CLI tools.|https://pypi.org/project/frida-tools/#files +python2-frida-tools|10.6.2|Frida CLI tools.|https://pypi.org/project/frida-tools/#files qark|301.ba1b265|Tool to look for several security related Android application vulnerabilities.|https://github.com/linkedin/qark quark-engine|21.6.2|An Obfuscation-Neglect Android Malware Scoring System.|https://github.com/quark-engine/quark-engine sign|10.2dc4018|Automatically signs an apk with the Android test certificate.|https://github.com/appium/sign diff --git a/data/networking b/data/networking index c942a815..d18ec7f0 100644 --- a/data/networking +++ b/data/networking @@ -34,7 +34,7 @@ dublin-traceroute|332.16c002c|NAT-aware multipath tracerouting tool.|https://git dump1090|386.bff92c4|A simple Mode S decoder for RTLSDR devices.|https://github.com/MalcolmRobb/dump1090 etherape|0.9.20|Graphical network monitor for various OSI layers and protocols|http://etherape.sourceforge.net/ evillimiter|36.46d2033|Tool that limits bandwidth of devices on the same network without access.|https://github.com/bitbrute/evillimiter -exabgp|4892.e6656f63|The BGP swiss army knife of networking.|https://github.com/Exa-Networks/exabgp +exabgp|4935.8f06fee2|The BGP swiss army knife of networking.|https://github.com/Exa-Networks/exabgp filibuster|167.c54ac80|A Egress filter mapping application with additional functionality.|https://github.com/subinacls/Filibuster firecat|6.b5205c8|A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.|https://github.com/BishopFox/firecat flowinspect|97.34759ed|A network traffic inspection tool.|https://github.com/7h3rAm/flowinspect @@ -55,7 +55,7 @@ hyenae|0.36_1|Flexible platform independent packet generator.|http://sourceforge hyperfox|121.1a8c26f|A security tool for proxying and recording HTTP and HTTPs traffic.|https://github.com/xiam/hyperfox i2pd|2.42.1|A full-featured C++ implementation of the I2P router|https://i2pd.website/ impacket|0.9.24|Collection of classes for working with network protocols|https://github.com/CoreSecurity/impacket -infection-monkey|v1.8.2.r5051.gccc29e448|Automated security testing tool for networks.|https://github.com/guardicore/monkey +infection-monkey|v1.8.2.r5124.g594d21559|Automated security testing tool for networks.|https://github.com/guardicore/monkey interlace|340.2e56cc5|Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.|https://github.com/codingo/Interlace/releases ipaudit|1.1|Monitors network activity on a network.|http://ipaudit.sourceforge.net ipdecap|96.45d2a7d|Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.|http://www.loicp.eu/ipdecap#dependances @@ -99,7 +99,7 @@ nsdtool|0.1|A netgear switch discovery tool. It contains some extra features lik nsoq|1.9.5|A Network Security Tool for packet manipulation that allows a large number of options.|http://www.nsoq.org/ packet-o-matic|351|A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.|http://www.packet-o-matic.org/ packeth|2.1|Linux GUI packet generator tool for ethernet|http://packeth.sourceforge.net/ -packetq|272.f0ce9ae|A tool that provides a basic SQL-frontend to PCAP-files.|https://github.com/DNS-OARC/PacketQ +packetq|276.260ee20|A tool that provides a basic SQL-frontend to PCAP-files.|https://github.com/DNS-OARC/PacketQ packetsender|770.c907ae8|An open source utility to allow sending and receiving TCP and UDP packets.|https://github.com/dannagle/PacketSender packit|1.0|A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.|http://packit.sourceforge.net/ pcapfex|60.c51055a|Packet CAPture Forensic Evidence eXtractor.|https://github.com/vikwin/pcapfex @@ -154,7 +154,7 @@ udpastcp|29.683b5e3|This program hides UDP traffic as TCP traffic in order to by udptunnel|19|Tunnels TCP over UDP packets.|http://code.google.com/p/udptunnel/ umit|1.0|A powerful nmap frontend.|http://www.umitproject.org/ uw-offish|0.1|Clear-text protocol simulator.|http://uberwall.org/bin/download/42/UW_offish.1.tar.gz -websockify|896.4b19463|WebSocket to TCP proxy/bridge.|http://github.com/kanaka/websockify +websockify|898.33910d7|WebSocket to TCP proxy/bridge.|http://github.com/kanaka/websockify wondershaper|48.98792b5|Limit the bandwidth of one or more network adapters.|https://github.com/magnific0/wondershaper xerosploit|33.2a65f3d|Efficient and advanced man in the middle framework.|https://github.com/LionSec/xerosploit xxeserv|12.046c559|A mini webserver with FTP support for XXE payloads.|https://github.com/staaldraad/xxeserv @@ -163,5 +163,5 @@ yersinia|0.8.2|A network tool designed to take advantage of some weakness in dif zackattack|5.1f96c14|A new tool set to do NTLM Authentication relaying unlike any other tool currently out there.|https://github.com/urbanesec/ZackAttack/ zdns|249.bfbfae2|Fast CLI DNS Lookup Tool.|https://github.com/zmap/zdns zeek|13053.0c2f04548|A powerful network analysis framework that is much different from the typical IDS you may know.|https://github.com/zeek/zeek -zeek-aux|518.e76e84e|Handy auxiliary programs related to the use of the Zeek Network Security Monitor.|https://github.com/zeek/zeek-aux +zeek-aux|523.25fc68a|Handy auxiliary programs related to the use of the Zeek Network Security Monitor.|https://github.com/zeek/zeek-aux zssh|1.5c|SSH and Telnet client with ZMODEM file transfer capability|http://zssh.sourceforge.net/ diff --git a/data/packer b/data/packer index 63490ea3..7f57f3a1 100644 --- a/data/packer +++ b/data/packer @@ -1,2 +1,2 @@ sherlocked|1.f190c2b|Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.|https://github.com/elfmaster/sherlocked -vbsmin|v1.1.0.r9.g062251a|VBScript minifier.|https://noraj.github.io/vbsmin/ +vbsmin|v1.1.0.r10.g1da3a5d|VBScript minifier.|https://noraj.github.io/vbsmin/ diff --git a/data/recon b/data/recon index aaec8d21..39e5e616 100644 --- a/data/recon +++ b/data/recon @@ -13,7 +13,7 @@ basedomainname|0.1|Tool that can extract TLD (Top Level Domain), domain extensio bfac|53.18fb0b5|An automated tool that checks for backup artifacts that may disclose the web-application's source code.|https://github.com/mazen160/bfac billcipher|32.97fba59|Information Gathering tool for a Website or IP address.|https://github.com/GitHackTools/BillCipher bing-ip2hosts|1.0.5|Enumerates all hostnames which Bing has indexed for a specific IP address.|http://www.morningstarsecurity.com/research/bing-ip2hosts -bloodhound|1321.d8da698|Six Degrees of Domain Admin|https://github.com/BloodHoundAD/BloodHound +bloodhound|1323.4fd3b95|Six Degrees of Domain Admin|https://github.com/BloodHoundAD/BloodHound bloodhound-python|v1.0.1.r43.gec2a9a9|Bloodhound python data collector|https://github.com/fox-it/BloodHound.py catnthecanary|7.e9184fe|An application to query the canary.pw data set for leaked data.|https://github.com/packetassailant/catnthecanary ccrawldns|5.17187e5|Retrieves from the CommonCrawl data set unique subdomains for a given domain name.|https://github.com/lgandx/CCrawlDNS @@ -23,7 +23,7 @@ citadel|95.3b1adbc|A library of OSINT tools.|https://github.com/jakecreps/Citade cloud-buster|194.b55e4a1|A tool that checks Cloudflare enabled sites for origin IP leaks.|https://github.com/SageHack/cloud-buster cloudfail|79.7982c7d|Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network.|https://github.com/m0rtem/CloudFail cloudlist|118.a2d2952|A tool for listing Assets from multiple Cloud Providers.|https://github.com/projectdiscovery/cloudlist -cloudmare|88.01594bb|A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS.|https://github.com/MrH0wl/Cloudmare +cloudmare|89.dc36cfc|A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS.|https://github.com/MrH0wl/Cloudmare cloudunflare|14.b91a8a7|Reconnaissance Real IP address for Cloudflare Bypass.|https://github.com/greycatz/CloudUnflare cr3dov3r|46.99a1660|Search for public leaks for email addresses + check creds against 16 websites.|https://github.com/D4Vinci/Cr3dOv3r cutycapt|10|A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.|http://cutycapt.sourceforge.net/ @@ -32,7 +32,7 @@ dga-detection|78.0a3186e|DGA Domain Detection using Bigram Frequency Analysis.|h dns-parallel-prober|58.d8547e2|PoC for an adaptive parallelised DNS prober.|https://github.com/lorenzog/dns-parallel-prober dnsbrute|2.b1dc84a|Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.|https://github.com/d4rkcat/dnsbrute dnscobra|1.0|DNS subdomain bruteforcing tool with Tor support through torsocks|https://github.com/dmitescu/dnscobra -dnsenum|1.2.4.2|Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.|http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum +dnsenum|1.2.4.2|Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.|https://github.com/fwaeytens/dnsenum/ dnsgrep|14.3f4fa7c|A utility for quickly searching presorted DNS names.|https://github.com/erbbysam/DNSGrep dnsprobe|56.7120008|Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.|https://github.com/projectdiscovery/dnsprobe dnsrecon|1.0.0|Python script for enumeration of hosts, subdomains and emails from a given domain using google.|https://github.com/darkoperator/dnsrecon @@ -45,7 +45,7 @@ domain-analyzer|0.8.1|Finds all the security information for a given domain name domain-stats|165.1cf05bf|A web API to deliver domain information from whois and alexa.|https://github.com/MarkBaggett/domain_stats domained|80.d9d079c|Multi Tool Subdomain Enumeration.|https://github.com/TypeError/domained domainhunter|38.c185116|Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.|https://github.com/threatexpress/domainhunter -dradis-ce|5122.b599c4a2|An open source framework to enable effective information sharing.|http://dradisframework.org/ +dradis-ce|5126.4bfe5cfe|An open source framework to enable effective information sharing.|http://dradisframework.org/ elevate|27.1272d51|Horizontal domain discovery tool you can use to discover other domains owned by a given company.|https://github.com/Healdb/Elevate enum4linux|0.9.1|A tool for enumerating information from Windows and Samba systems.|http://labs.portcullis.co.uk/application/enum4linux/ enum4linux-ng|326.e79345d|A next generation version of enum4linux.|https://github.com/cddmp/enum4linux-ng @@ -72,7 +72,7 @@ gitem|104.d40a1c9|A Github organization reconnaissance tool.|https://github.com/ gitgraber|67.72e5850|Monitor GitHub to search and find sensitive data in real time for different online services.|https://github.com/hisxo/gitGraber githack|16.a3d70b1|A `.git` folder disclosure exploit.|https://github.com/lijiejie/githack github-dorks|79.bc65a29|Collection of github dorks and helper tool to automate the process of checking dorks.|https://github.com/techgaun/github-dorks -gitleaks|799.d6c0de7|Audit Git repos for secrets and keys.|https://github.com/zricethezav/gitleaks +gitleaks|806.82e409a|Audit Git repos for secrets and keys.|https://github.com/zricethezav/gitleaks gitmails|71.8aa8411|An information gathering tool to collect git commit emails in version control host services.|https://github.com/giovanifss/gitmails gitminer|54.16ada58|Tool for advanced mining for content on Github.|https://github.com/danilovazb/GitMiner gitrecon|30.6467e78|OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.|https://github.com/GONZOsint/gitrecon @@ -106,9 +106,9 @@ iptodomain|18.f1afcd7|This tool extract domains from IP address based in the inf ipv666|182.ad45ae8|Golang IPv6 address enumeration.|https://github.com/lavalamp-/ipv666 ircsnapshot|94.cb02a85|Tool to gather information from IRC servers.|https://github.com/bwall/ircsnapshot isr-form|1.0|Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.|http://www.infobyte.com.ar/ -ivre|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,...|https://ivre.rocks/ -ivre-docs|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (documentation)|https://ivre.rocks/ -ivre-web|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (web application)|https://ivre.rocks/ +ivre|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,...|https://ivre.rocks/ +ivre-docs|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (documentation)|https://ivre.rocks/ +ivre-web|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (web application)|https://ivre.rocks/ jackdaw|396.4c06e2b|Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions|https://github.com/skelsec/jackdaw jsearch|44.87cf9c1|Simple script that grep infos from javascript files.|https://github.com/incogbyte/jsearch kacak|1.0|Tools for penetration testers that can enumerate which users logged on windows system.|https://github.com/galkan/kacak @@ -129,7 +129,7 @@ machinae|193.8bbe99a|A tool for collecting intelligence from public sites/feeds mail-crawl|0.1|Tool to harvest emails from website.|https://raw.githubusercontent.com/galkan/tools/master/mail-crawl/ massbleed|20.44b7e85|SSL Vulnerability Scanner.|https://github.com/1N3/Sn1per mdns-recon|11.69b864e|An mDNS recon tool written in Python.|https://github.com/chadillac/mdns_recon -metabigor|51.3406d87|Intelligence Tool but without API key.|https://github.com/j3ssie/metabigor +metabigor|54.7b8c30e|Intelligence Tool but without API key.|https://github.com/j3ssie/metabigor metafinder|v1.2.r0.g2caed73|Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata.|https://github.com/Josue87/MetaFinder metagoofil|71.036ea11|An information gathering tool designed for extracting metadata of public documents.|http://www.edge-security.com/metagoofil.php mildew|11.df49c23|Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs.|https://github.com/daehee/mildew @@ -159,12 +159,12 @@ pmapper|82.91d2e60|A tool for quickly evaluating IAM permissions in AWS.|https:/ postenum|116.9cd9d7e|Clean, nice and easy tool for basic/advanced privilege escalation techniques.|https://github.com/mbahadou/postenum protosint|26.1ee6ee4|Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses.|https://github.com/pixelbubble/ProtOSINT punter|45.97b7bed|Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare.|https://github.com/nethunteros/punter -pwned|1689.39a74a6|A command-line tool for querying the 'Have I been pwned?' service.|https://github.com/wKovacs64/pwned +pwned|1701.e1a46a1|A command-line tool for querying the 'Have I been pwned?' service.|https://github.com/wKovacs64/pwned pwned-search|40.04c1439|Pwned Password API lookup.|https://github.com/mikepound/pwned-search pwnedornot|145.a082e6c|Tool to find passwords for compromised email addresses.|https://github.com/thewhiteh4t/pwnedOrNot pymeta|13.fa74e64|Auto Scanning to SSL Vulnerability.|https://github.com/m8r0wn/pymeta python-api-dnsdumpster|76.fa952c6|Unofficial Python API for http://dnsdumpster.com/.|https://github.com/PaulSec/API-dnsdumpster.com -python-ivre|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)|https://ivre.rocks/ +python-ivre|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)|https://ivre.rocks/ python-shodan|1.27.0|The official Python library and CLI for Shodan|https://shodan.readthedocs.io/ python2-api-dnsdumpster|76.fa952c6|Unofficial Python API for http://dnsdumpster.com/.|https://github.com/PaulSec/API-dnsdumpster.com python2-ivre|0.9.16.dev26|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)|https://ivre.rocks/ @@ -195,7 +195,7 @@ smbcrunch|12.313400e|3 tools that work together to simplify reconnaissance of Wi smtp-user-enum|1.2|Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.|http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum socialscan|118.3fc7912|Check email address and username availability on online platforms.|https://github.com/iojw/socialscan spfmap|8.a42d15a|A program to map out SPF and DKIM records for a large number of domains.|https://github.com/BishopFox/spfmap -spiderfoot|3.5|The Open Source Footprinting Tool.|https://github.com/smicallef/spiderfoot +spiderfoot|4.0|The Open Source Footprinting Tool.|https://github.com/smicallef/spiderfoot spoofcheck|16.8cce591|Simple script that checks a domain for email protections.|https://github.com/bishopfox/spoofcheck spyse|47.cd11ba9|Python API wrapper and command-line client for the tools hosted on spyse.com.|https://github.com/zeropwn/spyse.py ssl-hostname-resolver|1|CN (Common Name) grabber on X.509 Certificates over HTTPS.|http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html @@ -210,7 +210,7 @@ swamp|59.3c8be65|An OSINT tool for discovering associated sites through Google A syborg|36.5cd010b|Recursive DNS Subdomain Enumerator with dead-end avoidance system.|https://github.com/MilindPurswani/Syborg teamsuserenum|v1.0.r1.g0c8b6c2|User enumeration with Microsoft Teams API|https://github.com/immunIT/TeamsUserEnum thedorkbox|7.43852d3|Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data.|https://github.com/cybersafeblr/thedorkbox -theharvester|2814.f9b0cbc|Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).|http://www.edge-security.com/theHarvester.php +theharvester|2828.8b7dbc7|Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).|http://www.edge-security.com/theHarvester.php tilt|90.2bc2ef2|An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.|https://github.com/AeonDave/tilt tinfoleak|3.6469eb3|Get detailed information about a Twitter user activity.|https://github.com/technoskald/tinfoleak/ tinfoleak2|41.c45c33e|The most complete open-source tool for Twitter intelligence analysis.|http://www.vicenteaguileradiaz.com/tools/ diff --git a/data/reversing b/data/reversing index f6527b6e..808f4123 100644 --- a/data/reversing +++ b/data/reversing @@ -28,9 +28,9 @@ netzob|1.0.2|An open source tool for reverse engineering, traffic generation and pintool|24.d538a79|This tool can be useful for solving some reversing challenges in CTFs events.|https://github.com/wagiro/pintool pintool2|5.1c1af91|Improved version of pintool.|https://github.com/sebastiendamaye/pintool2 python-capstone|4.0.2|Lightweight multi-platform, multi-architecture disassembly framework|https://www.capstone-engine.org/index.html -python-frida|15.1.22|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.|https://pypi.org/project/frida/#files +python-frida|15.1.24|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.|https://pypi.org/project/frida/#files python-jsbeautifier|1.14.3|JavaScript unobfuscator and beautifier|https://github.com/beautify-web/js-beautify -python2-frida|15.1.22|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.|https://pypi.org/project/frida/#files +python2-frida|15.1.24|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.|https://pypi.org/project/frida/#files r2ghidra|5.6.2.r1.ga4ba1ddc|Deep ghidra decompiler integration for radare2 and iaito|https://github.com/radareorg/r2ghidra radare2|5.6.6|Open-source tools to disasm, debug, analyze and manipulate binary files|https://radare.org radare2-keystone|667.caee604|Keystone assembler plugins for radare2.|https://github.com/radare/radare2-extras/tree/master/unicorn diff --git a/data/scanner b/data/scanner index fc39b065..53e61304 100644 --- a/data/scanner +++ b/data/scanner @@ -29,10 +29,10 @@ check-weak-dh-ssh|0.1|Debian OpenSSL weak client Diffie-Hellman Exchange checker chiron|48.524abe1|An all-in-one IPv6 Penetration Testing Framework.|http://www.secfu.net/tools-scripts/ cipherscan|419.c67f3ee|A very simple way to find out which SSL ciphersuites are supported by a target.|https://github.com/jvehent/cipherscan ciscos|1.3|Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.| -clair|1540.4bb2d332|Vulnerability Static Analysis for Containers.|https://github.com/quay/clair +clair|1545.12b676d4|Vulnerability Static Analysis for Containers.|https://github.com/quay/clair climber|30.5530a78|Check UNIX/Linux systems for privilege escalation.|https://github.com/raffaele-forte/climber cloudflare-enum|10.412387f|Cloudflare DNS Enumeration Tool for Pentesters.|https://github.com/mandatoryprogrammer/cloudflare_enum -cloudsploit|1919.c1b90d74|AWS security scanning checks.|https://github.com/cloudsploit/scans +cloudsploit|2212.77621542|AWS security scanning checks.|https://github.com/cloudsploit/scans cmsmap|8.59dd0e2|A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.|https://www.dionach.com/blog/cmsmap-%E2%80%93-a-simple-cms-vulnerability-scanner configpush|0.8.5|This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.|http://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html corstest|10.beffd0b|A simple CORS misconfigurations checker.|https://github.com/RUB-NDS/CORStest @@ -59,10 +59,10 @@ dnmap|0.6|The distributed nmap framework.|http://sourceforge.net/projects/dnmap/ dns2geoip|0.1|A simple python script that brute forces DNS and subsequently geolocates the found subdomains.|http://packetstormsecurity.com/files/118036/DNS-GeoIP.html dnsa|0.6|A dns security swiss army knife.|http://packetfactory.openwall.net/projects/dnsa/index.html dnsbf|0.3|Search for available domain names in an IP range.|http://code.google.com/p/dnsbf -dnscan|202.f25c671|A python wordlist-based DNS subdomain scanner.|https://github.com/rbsec/dnscan +dnscan|205.48fa99b|A python wordlist-based DNS subdomain scanner.|https://github.com/rbsec/dnscan dnsgoblin|0.1|Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.|http://nullsecurity.net/tools/scanner.html dnspredict|0.0.2|DNS prediction.|http://johnny.ihackstuff.com/ -dnstwist|463.d7fe8f3|Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.|https://github.com/elceef/dnstwist +dnstwist|464.7692bc6|Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.|https://github.com/elceef/dnstwist dockerscan|59.590a844|Docker security analysis & hacking tools.|https://github.com/cr0hn/dockerscan dorkbot|174.7a539b5|Command-line tool to scan Google search results for vulnerabilities.|https://github.com/utiso/dorkbot dorkme|57.0a7017a|Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.|https://github.com/blueudp/DorkMe @@ -84,7 +84,7 @@ flunym0us|2.0|A Vulnerability Scanner for Wordpress and Moodle.|http://code.goog forkingportscanner|1|Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.|http://magikh0e.xyz/ fortiscan|0.7.r7.gd54faa0|A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.|https://github.com/anasbousselham/fortiscan fs-nyarl|1.0|A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.|http://www.fulgursecurity.com/en/content/fs-nyarl -fscan|1.7.1.r20.gcf9389e|A Security Auditing Tool.|https://github.com/shadow1ng/fscan +fscan|1.7.1.r22.ga2573e1|A Security Auditing Tool.|https://github.com/shadow1ng/fscan fsnoop|3.4|A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").|http://vladz.devzero.fr/fsnoop.php ftp-spider|1.0|FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.|http://packetstormsecurity.com/files/35120/ftp-spider.pl.html ftpscout|12.cf1dff1|Scans ftps for anonymous access.|https://github.com/RubenRocha/ftpscout @@ -139,7 +139,7 @@ leviathan|35.a1a1d8c|A mass audit toolkit which has wide range service discovery lfi-scanner|4.0|This is a simple perl script that enumerates local file inclusion attempts when given a specific target.|http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html lfisuite|85.470e01f|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner.|https://github.com/D35m0nd142/LFISuite linenum|75.c47f9b2|Scripted Local Linux Enumeration & Privilege Escalation Checks|https://github.com/rebootuser/LinEnum -linux-smart-enumeration|244.9e07dbe|Linux enumeration tool for pentesting and CTFs with verbosity levels.|https://github.com/diego-treitos/linux-smart-enumeration +linux-smart-enumeration|249.3395ee7|Linux enumeration tool for pentesting and CTFs with verbosity levels.|https://github.com/diego-treitos/linux-smart-enumeration littleblackbox|0.1.3|Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.|http://code.google.com/p/littleblackbox/wiki/FAQ locasploit|117.fa48151|Local enumeration and exploitation framework.|https://github.com/lightfaith/locasploit logmepwn|22.a8882bd|A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-44228 vulnerability.|https://github.com/0xInfection/LogMePwn @@ -173,8 +173,8 @@ nsec3map|20.1263537|A tool to enumerate the resource records of a DNS zone using ntlm-challenger|3.e7d3ba8|Parse NTLM over HTTP challenge messages.|https://github.com/b17zr/ntlm_challenger ntlm-scanner|6.4b29329|A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities.|https://github.com/preempt/ntlm-scanner ntlmrecon|75.da150d6|A tool to enumerate information from NTLM authentication enabled web endpoints.|https://github.com/sachinkamath/ntlmrecon -nuclei-templates|v9.0.2.r74.g58ed276bf|Community curated list of template files for the nuclei engine.|https://github.com/projectdiscovery/nuclei-templates.git -o-saft|4664.fb28299|A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.|https://www.owasp.org/index.php/O-Saft +nuclei-templates|v9.0.4.r611.g9b6fed937|Community curated list of template files for the nuclei engine.|https://github.com/projectdiscovery/nuclei-templates.git +o-saft|4665.1564cfe|A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.|https://www.owasp.org/index.php/O-Saft ocs|0.2|Compact mass scanner for Cisco routers with default telnet/enable passwords.|http://packetstormsecurity.com/files/119462/OCS-Cisco-Scanner.2.html onetwopunch|v1.0.0.r2.gd4ab4e8|Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.|https://github.com/superkojiman/onetwopunch onionscan|130.da42865|Scan Onion Services for Security Issues.|https://github.com/s-rah/onionscan @@ -207,7 +207,7 @@ rdp-cipher-checker|0.1|Enumerate the encryption protocols supported by the serve rdp-sec-check|11.d0cc143|Script to enumerate security settings of an RDP Service.|https://github.com/portcullislabs/rdp-sec-check relay-scanner|1.7|An SMTP relay scanner.|http://www.cirt.dk responder|v3.1.2.0.r7.g983a1c6|A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2 (multirelay version).|https://github.com/lgandx/Responder -retire|3.0.7.r10.gd5027e4|Scanner detecting the use of JavaScript libraries with known vulnerabilities.|http://retirejs.github.io/retire.js/ +retire|3.0.7.r11.gf491d25|Scanner detecting the use of JavaScript libraries with known vulnerabilities.|http://retirejs.github.io/retire.js/ routerhunter|21.4da257c|Tool used to find vulnerable routers and devices on the Internet and perform tests.|https://github.com/jh00nbr/Routerhunter.0 rtlizer|35.5614163|Simple spectrum analyzer.|https://github.com/csete/rtlizer rtlsdr-scanner|1013.3c032de|A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library.|https://github.com/EarToEarOak/RTLSDR-Scanner diff --git a/data/social b/data/social index b4db264e..0f11b92e 100644 --- a/data/social +++ b/data/social @@ -12,11 +12,11 @@ facebash|17.95c3c25|Facebook Brute Forcer in shellscript using TOR.|https://gith facebookosint|21.656a04a|OSINT tool to replace facebook graph search.|https://github.com/tomoneill19/facebookOSINT facebrok|33.0f6fe8d|Social Engineering Tool Oriented to facebook.|https://github.com/PowerScript/facebrok fbi|28.0f94e99|An accurate facebook account information gathering.|https://github.com/xHak9x/fbi -fluxion|1546.f1d2b8a|A security auditing and social-engineering research tool.|https://github.com/FluxionNetwork/fluxion +fluxion|1548.09a17a6|A security auditing and social-engineering research tool.|https://github.com/FluxionNetwork/fluxion genisys|53.d53bb0c|Powerful Telegram Members Scraping and Adding Toolkit.|https://github.com/Cryptonian007/Genisys gg-images|35.b2dd863|The application was created to allow anyone to easily download profile pictures from GG.|https://codeberg.org/nanoory/gg_images gocabrito|4.33ac59a|Super organized and flexible script for sending phishing campaigns.|https://github.com/KINGSABRI/goCabrito -gophish|790.704e6d5|Open-Source Phishing Framework.|https://github.com/gophish/gophish +gophish|793.d0ff382|Open-Source Phishing Framework.|https://github.com/gophish/gophish hemingway|8.9c70a13|A simple and easy to use spear phishing helper.|https://github.com/ytisf/hemingway hiddeneye|1228.7a3deaf|Modern phishing tool with advanced functionality.|https://github.com/DarkSecDevelopers/HiddenEye hiddeneye-legacy|RC1.r226.g7a3deaf|Modern Phishing Tool With Advanced Functionality.|https://github.com/DarkSecDevelopers/HiddenEye-Legacy @@ -30,7 +30,7 @@ osi.ig|101.4debaa2|Instagram OSINT Tool gets a range of information from an Inst pepe|13.b81889b|Collect information about email addresses from Pastebin.|https://github.com/woj-ciech/pepe phemail|28.302b24d|A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.|https://github.com/Dionach/PhEmail phishingkithunter|20.ac9bd1e|Find phishing kits which use your brand/organization's files and image'.|https://github.com/t4d/PhishingKitHunter -phoneinfoga|v2.4.2.r25.g503e24c|Information gathering & OSINT framework for phone numbers.|https://github.com/sundowndev/PhoneInfoga +phoneinfoga|v2.4.3.r2.gd7e6e84|Information gathering & OSINT framework for phone numbers.|https://github.com/sundowndev/PhoneInfoga phonia|593.8ae14ff|Advanced toolkits to scan phone numbers using only free resources.|https://github.com/entynetproject/phonia qrljacker|210.56b0e72|QRLJacker is a highly customizable exploitation framework to demonstrate "QRLJacking Attack Vector".|https://github.com/OWASP/QRLJacking/tree/master/QRLJacker raven|33.8646a58|A Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.|https://github.com/0x09AL/raven @@ -56,4 +56,4 @@ ultimate-facebook-scraper|236.5661bdc|A bot which scrapes almost everything abou userrecon-py|15.eebd422|Recognition usernames in 187 social networks.|https://github.com/lucmski/userrecon-py weeman|91.53c2efa|HTTP Server for phishing in python.|https://github.com/Hypsurus/weeman whatbreach|42.dad6b9f|OSINT tool to find breached emails and databases.|https://github.com/ekultek/whatbreach -whatsmyname|990.25c4e35|Tool to perform user and username enumeration on various websites.|https://github.com/WebBreacher/WhatsMyName +whatsmyname|994.0c8cb4e|Tool to perform user and username enumeration on various websites.|https://github.com/WebBreacher/WhatsMyName diff --git a/data/tools b/data/tools index 32b43f3b..1a72f77a 100644 --- a/data/tools +++ b/data/tools @@ -24,7 +24,7 @@ aeskeyfind|1.0|A tool to find AES key in RAM.| blackarch-cracker |http://citp.pr aespipe|2.4f|Reads data from stdin and outputs encrypted or decrypted results to stdout.| blackarch-crypto |http://loop-aes.sourceforge.net/aespipe/ aesshell|0.7|A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.| blackarch-backdoor |https://packetstormsecurity.com/files/132438/AESshell.7.html afflib|3.7.19|An extensible open format for the storage of disk images and related forensic information.| blackarch-forensic |https://github.com/sshock/AFFLIBv3 -aflplusplus|4.00c.r217.ga2eb1f14|American Fuzzing Lop fuzzer with community patches and additional features.| blackarch-fuzzer |https://aflplus.plus/ +aflplusplus|4.00c.r226.gba3c7bfe|American Fuzzing Lop fuzzer with community patches and additional features.| blackarch-fuzzer |https://aflplus.plus/ afpfs-ng|0.8.2|A client for the Apple Filing Protocol (AFP)| blackarch-networking |http://alexthepuffin.googlepages.com/ agafi|1.1|A gadget finder and a ROP-Chainer tool for x86 platforms.| blackarch-windows |https://github.com/CoreSecurity/Agafi against|0.2|A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.| blackarch-cracker |http://nullsecurity.net/tools/cracker.html @@ -54,14 +54,14 @@ androick|8.522cfb4|A python tool to help in forensics analysis on android.| blac android-apktool|2.5.0|A tool for reverse engineering Android apk files.| blackarch-reversing |https://ibotpeaches.github.io/Apktool/ android-ndk|r23.b|Android C/C++ developer kit| blackarch-mobile |https://developer.android.com/sdk/ndk/index.html android-sdk|26.1.1|Google Android SDK| blackarch-mobile |https://developer.android.com/studio/releases/sdk-tools.html -android-udev-rules|451.74801c6|Android udev rules.| blackarch-mobile |https://github.com/bbqlinux/android-udev-rules +android-udev-rules|452.aa4a6d8|Android udev rules.| blackarch-mobile |https://github.com/bbqlinux/android-udev-rules androidpincrack|2.ddaf307|Bruteforce the Android Passcode given the hash and salt.| blackarch-mobile |https://github.com/PentesterES/AndroidPINCrack androidsniffer|0.1|A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.| blackarch-mobile |http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html androwarn|135.626c02d|Yet another static code analyzer for malicious Android applications.| blackarch-mobile |https://github.com/maaaaz/androwarn angr|9.1.11752|The next-generation binary analysis platform from UC Santa Barbaras Seclab.| blackarch-binary |https://pypi.org/project/angr/#files angr-management|9.1.11752|This is the GUI for angr.| blackarch-binary |https://pypi.org/project/angr-management/#files angr-py2|7.8.9.26|The next-generation binary analysis platform from UC Santa Barbaras Seclab.| blackarch-binary |https://pypi.org/project/angr/#files -angrop|212.c1e859b|A rop gadget finder and chain builder.| blackarch-exploitation |https://github.com/salls/angrop +angrop|214.5fb6634|A rop gadget finder and chain builder.| blackarch-exploitation |https://github.com/salls/angrop anontwi|1.1b|A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.| blackarch-social |http://anontwi.sourceforge.net/ anti-xss|166.2725dc9|A XSS vulnerability scanner.| blackarch-webapp |https://github.com/lewangbtcc/anti-XSS antiransom|5|A tool capable of detect and stop attacks of Ransomware using honeypots.| blackarch-windows |http://www.security-projects.com/?Anti_Ransom___Download @@ -76,7 +76,7 @@ apnbf|0.1|A small python script designed for enumerating valid APNs (Access Poin appmon|175.a8e0373|A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida.| blackarch-mobile |https://github.com/dpnishant/appmon apt2|175.6732505|Automated penetration toolkit.| blackarch-automation |https://github.com/MooseDojo/apt2 aquatone|142.2daa022|A Tool for Domain Flyovers.| blackarch-recon |https://github.com/shelld3v/aquatone -arachni|1.6.1|A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.| blackarch-webapp |https://www.arachni-scanner.com +arachni|1.6.1.3|A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.| blackarch-webapp |https://www.arachni-scanner.com aranea|6.469b9ee|A fast and clean dns spoofing tool.| blackarch-spoof |https://github.com/TigerSecurity arcane|2.750cb9f|Backdoor iOS packages and create the necessary resources for APT repositories.| blackarch-mobile |https://github.com/tokyoneon/Arcane archivebox|903.59da482|The open source self-hosted web archive. Takes browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more.| blackarch-misc |https://github.com/pirate/ArchiveBox @@ -118,7 +118,7 @@ autonessus|24.7933022|This script communicates with the Nessus API in an attempt autonse|25.7c87f4c|Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner.| blackarch-automation |https://github.com/m4ll0k/AutoNSE autopsy|4.19.2|The forensic browser. A GUI for the Sleuth Kit.| blackarch-forensic |https://github.com/sleuthkit/autopsy autopwn|190.fc80cef|Specify targets and run sets of tools against them.| blackarch-automation |https://github.com/nccgroup/autopwn -autorecon|254.fec09fb|A multi-threaded network reconnaissance tool which performs automated enumeration of services.| blackarch-automation |https://github.com/Tib3rius/AutoRecon +autorecon|257.f724be8|A multi-threaded network reconnaissance tool which performs automated enumeration of services.| blackarch-automation |https://github.com/Tib3rius/AutoRecon autosint|234.e1f4937|Tool to automate common osint tasks.| blackarch-recon |https://github.com/bharshbarger/AutOSINT autosploit|281.9a6a5ef|Automate the exploitation of remote hosts.| blackarch-exploitation |https://github.com/NullArray/AutoSploit autovpn|18.28b1a87|Easily connect to a VPN in a country of your choice.| blackarch-networking |https://github.com/adtac/autovpn @@ -162,7 +162,7 @@ bdfproxy|107.276c367|Patch Binaries via MITM: BackdoorFactory + mitmProxy| black bdlogparser|2|This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintenance of your malware collection.| blackarch-malware |http://magikh0e.xyz/ bed|0.5|Collection of scripts to test for buffer overflows, format string vulnerabilities.| blackarch-exploitation |http://www.aldeid.com/wiki/Bed beebug|25.cddb375|A tool for checking exploitability.| blackarch-decompiler |https://github.com/invictus1306/beebug -beef|4047.cbe9f669|The Browser Exploitation Framework that focuses on the web browser.| blackarch-exploitation |http://beefproject.com/ +beef|4048.a7a4c814|The Browser Exploitation Framework that focuses on the web browser.| blackarch-exploitation |http://beefproject.com/ beeswarm|1183.db51ea0|Honeypot deployment made easy http://www.beeswarm-ids.org/| blackarch-honeypot |https://github.com/honeynet/beeswarm/ beholder|0.8.10|A wireless intrusion detection tool that looks for anomalies in a wifi environment.| blackarch-wireless |http://www.beholderwireless.org/ belati|72.49577a1|The Traditional Swiss Army Knife for OSINT.| blackarch-scanner |https://github.com/aancw/Belati @@ -207,7 +207,7 @@ blindelephant|7|A web application fingerprinter. Attempts to discover the versio blindsql|1.0|Set of bash scripts for blind SQL injection attacks.| blackarch-database |http://www.enye-sec.org/programas.html blindy|12.59de8f2|Simple script to automate brutforcing blind sql injection vulnerabilities.| blackarch-scanner |https://github.com/missDronio/blindy blisqy|20.e9995fc|Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).| blackarch-webapp |https://github.com/JohnTroony/Blisqy -bloodhound|1321.d8da698|Six Degrees of Domain Admin| blackarch-recon |https://github.com/BloodHoundAD/BloodHound +bloodhound|1323.4fd3b95|Six Degrees of Domain Admin| blackarch-recon |https://github.com/BloodHoundAD/BloodHound bloodhound-python|v1.0.1.r43.gec2a9a9|Bloodhound python data collector| blackarch-recon |https://github.com/fox-it/BloodHound.py blue-hydra|710.1c2372d|A Bluetooth device discovery service built on top of the bluez library.| blackarch-bluetooth |https://github.com/pwnieexpress/blue_hydra bluebox-ng|1.1.0|A GPL VoIP/UC vulnerability scanner.| blackarch-voip |https://github.com/jesusprubio/bluebox-ng @@ -236,7 +236,7 @@ bowcaster|230.17d69c1|A framework intended to aid those developing exploits.| bl box-js|411.e41c4ae|A tool for studying JavaScript malware.| blackarch-malware |https://github.com/CapacitorSet/box-js braa|0.82|A mass snmp scanner| blackarch-scanner |http://s-tech.elsat.net.pl/braa/ braces|0.4|A Bluetooth Tracking Utility.| blackarch-bluetooth |http://braces.shmoo.com/ -brakeman|3801.c6237463e|A static analysis security vulnerability scanner for Ruby on Rails applications.| blackarch-code-audit |https://brakemanscanner.org/ +brakeman|3805.26735dd99|A static analysis security vulnerability scanner for Ruby on Rails applications.| blackarch-code-audit |https://brakemanscanner.org/ brosec|278.c51164f|An interactive reference tool to help security professionals utilize useful payloads and commands.| blackarch-exploitation |https://github.com/gabemarshall/Brosec browselist|1.4|Retrieves the browse list ; the output list contains computer names, and the roles they play in the network.| blackarch-windows |http://ntsecurity.nu/toolbox/browselist/ browser-fuzzer|3|Browser Fuzzer 3| blackarch-fuzzer |http://www.krakowlabs.com/dev.html @@ -276,13 +276,13 @@ cachedump|1.1|A tool that demonstrates how to recover cache entry information: u cadaver|0.23.3|Command-line WebDAV client for Unix| blackarch-networking |https://packages.debian.org/jessie/cadaver cafebabe|0.1.2|Java bytecode editor & decompiler.| blackarch-decompiler |https://grax.info/ cameradar|194.d73878a|Hacks its way into RTSP videosurveillance cameras.| blackarch-scanner |https://github.com/Ullaakut/cameradar -camover|72.2afe39f|A camera exploitation tool that allows to disclosure network camera admin password.| blackarch-exploitation |https://github.com/EntySec/camover +camover|73.abcded1|A camera exploitation tool that allows to disclosure network camera admin password.| blackarch-exploitation |https://github.com/EntySec/camover camscan|1.0057215|A tool which will analyze the CAM table of Cisco switches to look for anamolies.| blackarch-scanner |https://github.com/securestate/camscan can-utils|841.6e7f845|Linux-CAN / SocketCAN user space applications.| blackarch-automobile |https://github.com/linux-can/can-utils canalyzat0r|41.6bc251e|Security analysis toolkit for proprietary car protocols.| blackarch-automobile |https://github.com/schutzwerk/CANalyzat0r canari|3.3.10|Maltego rapid transform development and execution framework.| blackarch-forensic |https://pypi.org/project/canari/#files cangibrina|123.6de0165|Dashboard Finder.| blackarch-scanner |https://github.com/fnk0c/cangibrina -cansina|56.56d14a5|A python-based Web Content Discovery Tool.| blackarch-webapp |https://github.com/deibit/cansina +cansina|57.e0d9727|A python-based Web Content Discovery Tool.| blackarch-webapp |https://github.com/deibit/cansina cantoolz|425.82d330b|Framework for black-box CAN network analysis.| blackarch-automobile |https://github.com/CANToolz/CANToolz capfuzz|34.97ac312|Capture, fuzz and intercept web traffic.| blackarch-sniffer |https://github.com/MobSF/CapFuzz capstone|4.0.2|Lightweight multi-platform, multi-architecture disassembly framework| blackarch-reversing |https://www.capstone-engine.org/index.html @@ -298,7 +298,7 @@ cecster|5.15544cb|A tool to perform security testing against the HDMI CEC (Consu centry|72.6de2868|Cold boot & DMA protection| blackarch-misc |https://github.com/0xPoly/Centry cero|v1.3.0.r3.gd64990f|Scrape domain names from SSL certificates of arbitrary hosts.| blackarch-scanner |https://github.com/glebarez/cero certgraph|163.508f05d|Crawl the graph of certificate Alternate Names.| blackarch-recon |https://github.com/lanrat/certgraph -cewl|136.2b6e370|A custom word list generator.| blackarch-automation |http://www.digininja.org/projects/cewl.php +cewl|138.ddda1c0|A custom word list generator.| blackarch-automation |http://www.digininja.org/projects/cewl.php cflow|1.7|A C program flow analyzer.| blackarch-code-audit |http://www.gnu.org/software/cflow/ cfr|152|Another Java decompiler.| blackarch-decompiler |http://www.benf.org/other/cfr/ chainsaw|v1.1.7.r4.g0bfdc0e|A powerful ‘first-response’ capability to quickly identify threats within Windows event logs.| blackarch-defensive |https://github.com/countercept/chainsaw @@ -313,9 +313,9 @@ chapcrack|17.ae2827f|A tool for parsing and decrypting MS-CHAPv2 network handsha cheat-sh|6|The only cheat sheet you need.| blackarch-automation |https://cheat.sh check-weak-dh-ssh|0.1|Debian OpenSSL weak client Diffie-Hellman Exchange checker.| blackarch-scanner |http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html checkiban|0.2|Checks the validity of an International Bank Account Number (IBAN).| blackarch-misc |http://kernel.embedromix.ro/us/ -checksec|2.5.0|Tool designed to test which standard Linux OS and PaX security features are being used| blackarch-automation |https://github.com/slimm609/checksec.sh +checksec|2.6.0|Tool designed to test which standard Linux OS and PaX security features are being used| blackarch-automation |https://github.com/slimm609/checksec.sh chiasm-shell|33.e20ed9f|Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone.| blackarch-disassembler |https://github.com/0xbc/chiasm-shell -chipsec|1485.c8049969|Platform Security Assessment Framework.| blackarch-hardware |https://github.com/chipsec/chipsec +chipsec|1496.ad358086|Platform Security Assessment Framework.| blackarch-hardware |https://github.com/chipsec/chipsec chiron|48.524abe1|An all-in-one IPv6 Penetration Testing Framework.| blackarch-scanner |http://www.secfu.net/tools-scripts/ chisel|201.9e97ddf|A fast TCP tunnel over HTTP.| blackarch-tunnel |https://github.com/jpillora/chisel chkrootkit|0.55|Checks for rootkits on a system.| blackarch-defensive |http://www.chkrootkit.org/ @@ -346,7 +346,7 @@ cisco7crack|2.f1c21dd|Crypt and decrypt the cisco enable 7 passwords.| blackarch ciscos|1.3|Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.| blackarch-scanner | citadel|95.3b1adbc|A library of OSINT tools.| blackarch-recon |https://github.com/jakecreps/Citadel cjexploiter|6.72b08d8|Drag and Drop ClickJacking exploit development assistance tool.| blackarch-webapp |https://github.com/enddo/CJExploiter -clair|1540.4bb2d332|Vulnerability Static Analysis for Containers.| blackarch-scanner |https://github.com/quay/clair +clair|1545.12b676d4|Vulnerability Static Analysis for Containers.| blackarch-scanner |https://github.com/quay/clair clamscanlogparser|1|This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.| blackarch-malware |http://magikh0e.xyz/ clash|1.10.6|A rule based proxy in Go| blackarch-tunnel |https://github.com/Dreamacro/clash climber|30.5530a78|Check UNIX/Linux systems for privilege escalation.| blackarch-scanner |https://github.com/raffaele-forte/climber @@ -356,8 +356,8 @@ cloudfail|79.7982c7d|Utilize misconfigured DNS and old database records to find cloudflare-enum|10.412387f|Cloudflare DNS Enumeration Tool for Pentesters.| blackarch-scanner |https://github.com/mandatoryprogrammer/cloudflare_enum cloudget|64.cba10b1|Python script to bypass cloudflare from command line. Built upon cfscrape module.| blackarch-webapp |https://github.com/eudemonics/cloudget cloudlist|118.a2d2952|A tool for listing Assets from multiple Cloud Providers.| blackarch-recon |https://github.com/projectdiscovery/cloudlist -cloudmare|88.01594bb|A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS.| blackarch-recon |https://github.com/MrH0wl/Cloudmare -cloudsploit|1919.c1b90d74|AWS security scanning checks.| blackarch-scanner |https://github.com/cloudsploit/scans +cloudmare|89.dc36cfc|A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS.| blackarch-recon |https://github.com/MrH0wl/Cloudmare +cloudsploit|2212.77621542|AWS security scanning checks.| blackarch-scanner |https://github.com/cloudsploit/scans cloudunflare|14.b91a8a7|Reconnaissance Real IP address for Cloudflare Bypass.| blackarch-recon |https://github.com/greycatz/CloudUnflare clusterd|143.d190b2c|Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.| blackarch-automation |https://github.com/hatRiot/clusterd cminer|25.d766f7e|A tool for enumerating the code caves in PE files.| blackarch-binary |https://github.com/EgeBalci/Cminer/ @@ -374,7 +374,7 @@ cntlm|4.b35d55c|An NTLM, NTLM2SR, and NTLMv2 authenticating HTTP proxy.| blackar codeql|2.8.1|The CLI tool for GitHub CodeQL| blackarch-automation |https://github.com/codeql codetective|45.52b91f1|A tool to determine the crypto/encoding algorithm used according to traces of its representation.| blackarch-crypto |https://www.digitalloft.org/init/plugin_wiki/page/codetective comission|203.67b890e|WhiteBox CMS analysis.| blackarch-webapp |https://github.com/Intrinsec/comission -commix|1814.916770a0|Automated All-in-One OS Command Injection and Exploitation Tool.| blackarch-webapp |https://github.com/commixproject/commix +commix|1821.7d0c36dc|Automated All-in-One OS Command Injection and Exploitation Tool.| blackarch-webapp |https://github.com/commixproject/commix commonspeak|36.f0aad23|Leverages publicly available datasets from Google BigQuery to generate wordlists.| blackarch-automation |https://github.com/assetnote/commonspeak2 complemento|0.7.6|A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever| blackarch-fingerprint |http://complemento.sourceforge.net compp|1.0.5|Company Passwords Profiler helps making a bruteforce wordlist for a targeted company.| blackarch-cracker |https://github.com/sec-it/ComPP @@ -410,7 +410,7 @@ credsniper|21.f52461b|Phishing framework written with the Python micro-framework creepy|137.9f60449|A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.| blackarch-scanner |http://github.com/ilektrojohn/creepy.git cribdrag|5.2d27dbf|An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys.| blackarch-crypto |https://github.com/SpiderLabs/cribdrag crlf-injector|9.bd6db06|A python script for testing CRLF injecting issues.| blackarch-fuzzer |https://github.com/rudSarkar/crlf-injector -crlfuzz|59.0f8ca90|A fast tool to scan CRLF vulnerability written in Go.| blackarch-webapp |https://github.com/dwisiswant0/crlfuzz +crlfuzz|60.da5d40c|A fast tool to scan CRLF vulnerability written in Go.| blackarch-webapp |https://github.com/dwisiswant0/crlfuzz crosslinked|4.d600f96|LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping.| blackarch-social |https://github.com/m8r0wn/crosslinked crosstool-ng|1.25.0|A versatile (cross-)toolchain generator| blackarch-misc |https://crosstool-ng.github.io/ crowbar|111.4b563dc|A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.| blackarch-cracker |https://github.com/galkan/crowbar @@ -421,7 +421,7 @@ cryptohazemultiforcer|1.31a|High performance multihash brute forcer with CUDA su cryptonark|0.5.7|SSL security checker.| blackarch-crypto |http://blog.techstacks.com/cryptonark.html csrftester|1.0|The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.| blackarch-webapp |http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project ct-exposer|23.23e8c84|An OSINT tool that discovers sub-domains by searching Certificate Transparency logs.| blackarch-scanner |https://github.com/chris408/ct-exposer -ctf-party|v2.1.0.r14.ge67f355|A CLI tool & library to enhance and speed up script/exploit writing for CTF players.| blackarch-misc |https://noraj.github.io/ctf-party/ +ctf-party|v2.1.0.r16.g41dc61d|A CLI tool & library to enhance and speed up script/exploit writing for CTF players.| blackarch-misc |https://noraj.github.io/ctf-party/ ctunnel|0.7|Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.| blackarch-tunnel |http://nardcore.org/ctunnel ctypes-sh|153.6982e6c|Allows you to call routines in shared libraries from within bash.| blackarch-reversing |https://github.com/taviso/ctypes.sh cuckoo|2.0.7|Automated malware analysis system.| blackarch-malware |http://cuckoosandbox.org/ @@ -429,14 +429,14 @@ cudahashcat|2.01|Worlds fastest WPA cracker with dictionary mutation engine.|bla cupp|77.56547fd|Common User Password Profiler| blackarch-cracker |http://www.remote-exploit.org/?page_id=418 cutycapt|10|A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.| blackarch-recon |http://cutycapt.sourceforge.net/ cve-api|170.8e9c247|Unofficial api for cve.mitre.org.| blackarch-misc |https://github.com/Beyarz/Cve-api -cve-search|v4.2.r40.gae4b26e|A tool to perform local searches for known vulnerabilities.| blackarch-exploitation |http://cve-search.github.io/cve-search +cve-search|v4.2.1.r0.gb99da1a|A tool to perform local searches for known vulnerabilities.| blackarch-exploitation |http://cve-search.github.io/cve-search cvechecker|4.0|The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.| blackarch-scanner |https://github.com/sjvermeu/cvechecker cybercrowl|111.f7cac52|A Python Web path scanner tool.| blackarch-webapp |https://github.com/chamli/CyberCrowl cyberscan|75.ca85794|A Network Pentesting Tool| blackarch-networking |https://github.com/medbenali/CyberScan cymothoa|1|A stealth backdooring tool, that inject backdoor's shellcode into an existing process.| blackarch-backdoor |http://cymothoa.sourceforge.net/ d-tect|13.9555c25|Pentesting the Modern Web.| blackarch-scanner |https://github.com/shawarkhanethicalhacker/D-TECT dagon|244.f065d7b|Advanced Hash Manipulation.| blackarch-crypto |https://github.com/Ekultek/Dagon -dalfox|1124.4b22de7|Parameter Analysis and XSS Scanning tool.| blackarch-webapp |https://github.com/hahwul/dalfox +dalfox|1128.0393e8d|Parameter Analysis and XSS Scanning tool.| blackarch-webapp |https://github.com/hahwul/dalfox damm|32.60e7ec7|Differential Analysis of Malware in Memory.| blackarch-malware |https://github.com/504ensicsLabs/DAMM daredevil|42.81cb57f|A tool to perform (higher-order) correlation power analysis attacks (CPA).| blackarch-crypto |https://github.com/SideChannelMarvels/Daredevil dark-dork-searcher|1.0|Dark-Dork Searcher.| blackarch-windows |http://rafale.org/~mattoufoutu/darkc0de.com/c0de/c/ @@ -480,7 +480,7 @@ dependency-check|6.5.3|A tool that attempts to detect publicly disclosed vulnera depix|38.f7d1850|A tool for recovering passwords from pixelized screenshots.| blackarch-misc |https://github.com/beurtschipper/Depix det|31.417cbce|(extensible) Data Exfiltration Toolkit.| blackarch-networking |https://github.com/sensepost/det detect-it-easy|3.02|A program for determining types of files.| blackarch-binary |https://github.com/horsicq/DIE-engine/releases -detect-secrets|v1.2.0.r21.ge8426a4|An enterprise friendly way of detecting and preventing secrets in code.| blackarch-code-audit |https://github.com/Yelp/detect-secrets +detect-secrets|v1.2.0.r23.g3c8ee74|An enterprise friendly way of detecting and preventing secrets in code.| blackarch-code-audit |https://github.com/Yelp/detect-secrets detect-sniffer|151.63f0d7f|Tool that detects sniffers in the network.| blackarch-defensive |https://github.com/galkan/tools/tree/master/detect_sniffer detectem|276.bc5f073|Detect software and its version on websites.| blackarch-fingerprint |https://github.com/spectresearch/detectem devaudit|803.ca0a68e|An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams.| blackarch-code-audit |https://github.com/sonatype-nexus-community/DevAudit @@ -489,14 +489,14 @@ dex2jar|2.1|A tool for converting Android's .dex format to Java's .class format| dexpatcher|1.7.0|Modify Android DEX/APK files at source-level using Java.| blackarch-mobile |https://github.com/DexPatcher/dexpatcher-tool dff-scanner|1.1|Tool for finding path of predictable resource locations.| blackarch-webapp |http://netsec.rs/70/tools.html dfir-ntfs|1.1.13|An NTFS parser for digital forensics & incident response.| blackarch-forensic |https://github.com/msuhanov/dfir_ntfs -dftimewolf|472.fe013850|Framework for orchestrating forensic collection, processing and data export .| blackarch-forensic |https://github.com/log2timeline/dftimewolf +dftimewolf|481.cf2702bd|Framework for orchestrating forensic collection, processing and data export .| blackarch-forensic |https://github.com/log2timeline/dftimewolf dga-detection|78.0a3186e|DGA Domain Detection using Bigram Frequency Analysis.| blackarch-recon |https://github.com/philarkwright/DGA-Detection dharma|98.6b1e511|Generation-based, context-free grammar fuzzer.| blackarch-fuzzer |https://github.com/MozillaSecurity/dharma dhcdrop|0.5|Remove illegal dhcp servers with IP-pool underflow.| blackarch-misc |http://www.netpatch.ru/dhcdrop.html dhcpf|3.a770b20|Passive DHCP fingerprinting implementation.| blackarch-fingerprint |https://github.com/elceef/dhcpf dhcpig|92.9fd8df5|Enhanced DHCPv4 and DHCPv6 exhaustion and fuzzing script written in python using scapy network library.| blackarch-scanner |https://github.com/kamorin/DHCPig dhcpoptinj|123.58a12c6|DHCP option injector.| blackarch-networking |https://github.com/misje/dhcpoptinj -didier-stevens-suite|321.fd0bb21|Didier Stevens Suite.| |https://github.com/DidierStevens/DidierStevensSuite +didier-stevens-suite|324.49c4f96|Didier Stevens Suite.| |https://github.com/DidierStevens/DidierStevensSuite dinouml|0.9.5|A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC| blackarch-networking |http://kernel.embedromix.ro/us/ dirb|2.22|A web content scanner, brute forceing for hidden files.| blackarch-scanner |http://dirb.sourceforge.net/ dirble|1.4.2|Fast directory scanning and scraping tool.| blackarch-webapp |https://github.com/nccgroup/dirble @@ -506,7 +506,7 @@ directorytraversalscan|1.0.1.0|Detect directory traversal vulnerabilities in HTT dirhunt|298.57bfd58|Find web directories without bruteforce.| blackarch-webapp |https://github.com/hahwul/dirhunt dirscanner|0.1|This is a python script that scans webservers looking for administrative directories, php shells, and more.| blackarch-scanner |http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html dirscraper|16.e752450|OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website.| blackarch-webapp |https://github.com/Cillian-Collins/dirscraper -dirsearch|2105.6494e9f|HTTP(S) directory/file brute forcer.| blackarch-webapp |https://github.com/maurosoria/dirsearch +dirsearch|2115.db98bbe|HTTP(S) directory/file brute forcer.| blackarch-webapp |https://github.com/maurosoria/dirsearch dirstalk|1.3.3|Modern alternative to dirbuster/dirb.| blackarch-scanner |https://github.com/stefanoj3/dirstalk disitool|0.4|Tool to work with Windows executables digital signatures.| blackarch-forensic |https://blog.didierstevens.com/my-software/#disitool dislocker|561.f9674c4|Read BitLocker encrypted volumes under Linux.| blackarch-crypto |http://www.hsc.fr/ressources/outils/dislocker @@ -527,12 +527,12 @@ dns2tcp|0.5.2|A tool for relaying TCP connections over DNS.| blackarch-tunnel |h dnsa|0.6|A dns security swiss army knife.| blackarch-scanner |http://packetfactory.openwall.net/projects/dnsa/index.html dnsbf|0.3|Search for available domain names in an IP range.| blackarch-scanner |http://code.google.com/p/dnsbf dnsbrute|2.b1dc84a|Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.| blackarch-recon |https://github.com/d4rkcat/dnsbrute -dnscan|202.f25c671|A python wordlist-based DNS subdomain scanner.| blackarch-scanner |https://github.com/rbsec/dnscan +dnscan|205.48fa99b|A python wordlist-based DNS subdomain scanner.| blackarch-scanner |https://github.com/rbsec/dnscan dnschef|17.a395411|A highly configurable DNS proxy for pentesters.| blackarch-proxy |http://thesprawl.org/projects/dnschef/ dnscobra|1.0|DNS subdomain bruteforcing tool with Tor support through torsocks| blackarch-recon |https://github.com/dmitescu/dnscobra dnsdiag|271.edb168f|DNS Diagnostics and Performance Measurement Tools.| blackarch-networking |https://dnsdiag.org/ dnsdrdos|0.1|Proof of concept code for distributed DNS reflection DoS.| blackarch-dos |http://nullsecurity.net/tools/dos.html -dnsenum|1.2.4.2|Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.| blackarch-recon |http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum +dnsenum|1.2.4.2|Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.| blackarch-recon |https://github.com/fwaeytens/dnsenum/ dnsfilexfer|24.126edcd|File transfer via DNS.| blackarch-networking |https://github.com/leonjza/dnsfilexfer dnsgoblin|0.1|Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.| blackarch-scanner |http://nullsecurity.net/tools/scanner.html dnsgrep|14.3f4fa7c|A utility for quickly searching presorted DNS names.| blackarch-recon |https://github.com/erbbysam/DNSGrep @@ -546,7 +546,7 @@ dnssearch|20.e4ea439|A subdomain enumeration tool.| blackarch-recon |https://git dnsspider|1.3|A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.| blackarch-recon |http://nullsecurity.net/tools/scanner.html dnsteal|28.1b09d21|DNS Exfiltration tool for stealthily sending files over DNS requests..| blackarch-networking |https://github.com/m57/dnsteal dnstracer|1.10|Determines where a given DNS server gets its information from, and follows the chain of DNS servers| blackarch-recon |https://www.mavetju.org/unix/dnstracer.php -dnstwist|463.d7fe8f3|Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.| blackarch-scanner |https://github.com/elceef/dnstwist +dnstwist|464.7692bc6|Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.| blackarch-scanner |https://github.com/elceef/dnstwist dnsvalidator|67.b12acc0|Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.| blackarch-networking |https://github.com/vortexau/dnsvalidator dnswalk|2.0.2|A DNS debugger and zone-transfer utility.| blackarch-recon |http://sourceforge.net/projects/dnswalk/ dnsx|309.5cb005c|Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.| blackarch-recon |https://github.com/projectdiscovery/dnsx @@ -575,7 +575,7 @@ dpscan|0.1|Drupal Vulnerability Scanner.| blackarch-scanner |https://github.com/ dr-checker|140.ea63c0f|A Soundy Vulnerability Detection Tool for Linux Kernel Drivers.| blackarch-exploitation |https://github.com/ucsb-seclab/dr_checker dr0p1t-framework|44.db9bc2d|A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks.| blackarch-backdoor |https://github.com/D4Vinci/Dr0p1t-Framework dracnmap|69.09d3945|Tool to exploit the network and gathering information with nmap help.| blackarch-automation |https://github.com/screetsec/Dracnmap -dradis-ce|5122.b599c4a2|An open source framework to enable effective information sharing.| blackarch-recon |http://dradisframework.org/ +dradis-ce|5126.4bfe5cfe|An open source framework to enable effective information sharing.| blackarch-recon |http://dradisframework.org/ dragon-backdoor|7.c7416b7|A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c.| blackarch-backdoor |https://github.com/Shellntel/backdoors driftnet|v1.3.0.r13.ge492335|Listens to network traffic and picks out images from TCP streams it observes.| blackarch-scanner |http://www.ex-parrot.com/~chris/driftnet/ drinkme|19.acf1a14|A shellcode testing harness.| blackarch-exploitation |https://github.com/emptymonkey/drinkme @@ -662,14 +662,14 @@ evil-ssdp|94.ee76fb0|Spoof SSDP replies to phish for NetNTLM challenge/response evil-winrm|v3.3.r0.gfc677a4|The ultimate WinRM shell for hacking/pentesting.| blackarch-exploitation |https://github.com/Hackplayers/evil-winrm evilclippy|62.fa610c6|A cross-platform assistant for creating malicious MS Office documents.| blackarch-exploitation |https://github.com/outflanknl/EvilClippy evilginx|2.4.0|Man-in-the-middle attack framework used for phishing login credentials| blackarch-social |https://github.com/kgretzky/evilginx2 -evilgrade|2.0.9|Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.| blackarch-misc |http://www.infobyte.com.ar/developments.html +evilgrade|2.0.9|Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.| blackarch-misc |https://github.com/infobyte/evilgrade evilize|0.2|Tool to create MD5 colliding binaries.| blackarch-cracker |http://www.mathstat.dal.ca/~selinger/md5collision/ evillimiter|36.46d2033|Tool that limits bandwidth of devices on the same network without access.| blackarch-networking |https://github.com/bitbrute/evillimiter evilmaid|1.01|TrueCrypt loader backdoor to sniff volume password| blackarch-cracker |http://theinvisiblethings.blogspot.com evilpdf|5.43696a8|Embedding executable files in PDF Documents.| blackarch-backdoor |https://github.com/thelinuxchoice/evilpdf evine|42.46051de|Interactive CLI Web Crawler.| blackarch-webapp |https://github.com/saeeddhqan/evine.git evtkit|8.af06db3|Fix acquired .evt - Windows Event Log files (Forensics).| blackarch-forensic |https://github.com/yarox24/evtkit -exabgp|4892.e6656f63|The BGP swiss army knife of networking.| blackarch-networking |https://github.com/Exa-Networks/exabgp +exabgp|4935.8f06fee2|The BGP swiss army knife of networking.| blackarch-networking |https://github.com/Exa-Networks/exabgp exe2image|1.1|A simple utility to convert EXE files to JPEG images and vice versa.| blackarch-backdoor |https://github.com/OsandaMalith/Exe2Image exescan|1.ad993e3|A tool to detect anomalies in PE (Portable Executable) files.| blackarch-binary |https://github.com/cysinfo/Exescan exitmap|369.172e763|A fast and modular scanner for Tor exit relays.| blackarch-recon |https://github.com/NullHypothesis/exitmap @@ -755,7 +755,7 @@ flasm|1.62|Disassembler tool for SWF bytecode| blackarch-reversing |http://www.n flawfinder|2.0.19|Searches through source code for potential security flaws| blackarch-code-audit |https://dwheeler.com/flawfinder/ flowinspect|97.34759ed|A network traffic inspection tool.| blackarch-networking |https://github.com/7h3rAm/flowinspect flunym0us|2.0|A Vulnerability Scanner for Wordpress and Moodle.| blackarch-scanner |http://code.google.com/p/flunym0us/ -fluxion|1546.f1d2b8a|A security auditing and social-engineering research tool.| blackarch-social |https://github.com/FluxionNetwork/fluxion +fluxion|1548.09a17a6|A security auditing and social-engineering research tool.| blackarch-social |https://github.com/FluxionNetwork/fluxion flyr|76.4926ecc|Block-based software vulnerability fuzzing framework.| blackarch-fuzzer |https://github.com/zznop/flyr fockcache|10.3e7efa9|Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages.| blackarch-webapp |https://github.com/tismayil/fockcache forager|115.7439b0a|Multithreaded threat Intelligence gathering utilizing.| blackarch-recon |https://github.com/byt3smith/Forager @@ -781,7 +781,7 @@ fridump|23.3e64ee0|A universal memory dumper using Frida.| blackarch-forensic |h frisbeelite|1.2|A GUI-based USB device fuzzer.| blackarch-fuzzer |https://github.com/nccgroup/FrisbeeLite fs-exploit|3.28bb9bb|Format string exploit generation.| blackarch-exploitation |https://github.com/miaouPlop/fs fs-nyarl|1.0|A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.| blackarch-scanner |http://www.fulgursecurity.com/en/content/fs-nyarl -fscan|1.7.1.r20.gcf9389e|A Security Auditing Tool.| blackarch-scanner |https://github.com/shadow1ng/fscan +fscan|1.7.1.r22.ga2573e1|A Security Auditing Tool.| blackarch-scanner |https://github.com/shadow1ng/fscan fsnoop|3.4|A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").| blackarch-scanner |http://vladz.devzero.fr/fsnoop.php fssb|73.51d2ac2|A low-level filesystem sandbox for Linux using syscall intercepts.| blackarch-defensive |https://github.com/adtac/fssb fstealer|0.1|Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines.| blackarch-automation |http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html @@ -814,8 +814,8 @@ gcrypt|30.7c2fd05|Simple, secure and performance file encryption tool written in gdb|12.1|The GNU Debugger| blackarch-debugger |https://www.gnu.org/software/gdb/ gdb-common|12.1|The GNU Debugger| blackarch-debugger |https://www.gnu.org/software/gdb/ gdbgui|429.799d340|Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust.| blackarch-debugger |https://github.com/cs01/gdbgui -gef|2259.e50af77|Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.| blackarch-debugger |https://github.com/hugsy/gef -gene|76.150d6e5|Signature Engine for Windows Event Logs.| blackarch-windows |https://github.com/0xrawsec/gene +gef|2260.7f45550|Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.| blackarch-debugger |https://github.com/hugsy/gef +gene|77.dca7ce6|Signature Engine for Windows Event Logs.| blackarch-windows |https://github.com/0xrawsec/gene genisys|53.d53bb0c|Powerful Telegram Members Scraping and Adding Toolkit.| blackarch-social |https://github.com/Cryptonian007/Genisys genlist|0.1|Generates lists of IP addresses.| blackarch-misc | geoedge|0.2|This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).| blackarch-recon | @@ -829,7 +829,7 @@ gf|39.dcd4c36|A wrapper around grep, to help you grep for things.| blackarch-mis gg-images|35.b2dd863|The application was created to allow anyone to easily download profile pictures from GG.| blackarch-social |https://codeberg.org/nanoory/gg_images gggooglescan|0.4|A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.| blackarch-scanner |http://www.morningstarsecurity.com/research/gggooglescan gh-dork|3.799f86f|Github dorking tool.| blackarch-recon |https://github.com/molly/gh-dork -ghettotooth|1.0|Ghettodriving for bluetooth| blackarch-bluetooth |http://www.oldskoolphreak.com/tfiles/ghettotooth.txt +ghettotooth|1.0|Ghettodriving for bluetooth.| blackarch-bluetooth |http://www.oldskoolphreak.com/tfiles/ghettotooth.txt ghidra|10.1.4|Software reverse engineering framework| blackarch-reversing |https://ghidra-sre.org/ ghost-phisher|1.62|GUI suite for phishing and penetration attacks| blackarch-scanner |http://code.google.com/p/ghost-phisher ghost-py|2.0.0|Webkit based webclient (relies on PyQT).| blackarch-webapp |http://jeanphix.github.com/Ghost.py/ @@ -848,7 +848,7 @@ gitgraber|67.72e5850|Monitor GitHub to search and find sensitive data in real ti githack|16.a3d70b1|A `.git` folder disclosure exploit.| blackarch-recon |https://github.com/lijiejie/githack github-dorks|79.bc65a29|Collection of github dorks and helper tool to automate the process of checking dorks.| blackarch-recon |https://github.com/techgaun/github-dorks githubcloner|35.2bcb9c2|A script that clones Github repositories of users and organizations automatically.| blackarch-misc |https://github.com/mazen160/GithubCloner -gitleaks|799.d6c0de7|Audit Git repos for secrets and keys.| blackarch-recon |https://github.com/zricethezav/gitleaks +gitleaks|806.82e409a|Audit Git repos for secrets and keys.| blackarch-recon |https://github.com/zricethezav/gitleaks gitmails|71.8aa8411|An information gathering tool to collect git commit emails in version control host services.| blackarch-recon |https://github.com/giovanifss/gitmails gitminer|54.16ada58|Tool for advanced mining for content on Github.| blackarch-recon |https://github.com/danilovazb/GitMiner gitrecon|30.6467e78|OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.| blackarch-recon |https://github.com/GONZOsint/gitrecon @@ -875,7 +875,7 @@ goohak|31.815a31e|Automatically Launch Google Hacking Queries Against A Target D goop|12.39b34eb|Perform google searches without being blocked by the CAPTCHA or hitting any rate limits.| blackarch-recon |https://github.com/s0md3v/goop gooscan|1.0.9|A tool that automates queries against Google search appliances, but with a twist.| blackarch-automation |http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/ gopherus|31.9ca94b8|Tool generates gopher link for exploiting SSRF and gaining RCE in various servers.| blackarch-webapp |https://github.com/tarunkant/Gopherus -gophish|790.704e6d5|Open-Source Phishing Framework.| blackarch-social |https://github.com/gophish/gophish +gophish|793.d0ff382|Open-Source Phishing Framework.| blackarch-social |https://github.com/gophish/gophish gosint|196.9c86ed2|OSINT framework in Go.| blackarch-recon |https://github.com/Nhoya/gOSINT gospider|104.0f399bd|Fast web spider written in Go.| blackarch-webapp |https://github.com/jaeles-project/gospider gostringsr2|1.1.2|Extract strings from a Go binary using radare2.| blackarch-reversing |https://github.com/CarveSystems/gostringsr2 @@ -923,7 +923,7 @@ hackrf|2021.03.1|Driver for HackRF, allowing general purpose software defined ra haiti|v1.3.0.r13.gdb5c601|A CLI tool to identify the hash type of a given hash.| blackarch-crypto |https://noraj.github.io/haiti/ haka|0.2.2|A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files.| blackarch-networking |https://github.com/haka-security/haka hakku|384.bbb434d|Simple framework that has been made for penetration testing tools.| blackarch-scanner |https://github.com/4shadoww/hakkuframework -hakrawler|214.d3c2b50|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application.| blackarch-webapp |https://github.com/hakluke/hakrawler +hakrawler|216.6190559|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application.| blackarch-webapp |https://github.com/hakluke/hakrawler hakrevdns|41.8b638e4|Small, fast tool for performing reverse DNS lookups en masse.| blackarch-recon |https://github.com/hakluke/hakrevdns halberd|0.2.4|Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.| blackarch-scanner |http://halberd.superadditive.com/ halcyon|0.1|A repository crawler that runs checksums for static files found within a given git repository.| blackarch-recon |http://www.blackhatlibrary.net/Halcyon @@ -1072,8 +1072,8 @@ inception|452.6c09195|A FireWire physical memory manipulation and hacking tool e indx2csv|17.129a411e|An advanced parser for INDX records.| blackarch-forensic |https://github.com/jschicht/Indx2Csv indxcarver|5.dee36608|Carve INDX records from a chunk of data.| blackarch-forensic |https://github.com/jschicht/IndxCarver indxparse|171.454d706|A Tool suite for inspecting NTFS artifacts.| blackarch-forensic |http://www.williballenthin.com/forensics/mft/indxparse/ -inetsim|1.3.2|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.| blackarch-defensive |http://www.inetsim.org -infection-monkey|v1.8.2.r5051.gccc29e448|Automated security testing tool for networks.| blackarch-networking |https://github.com/guardicore/monkey +inetsim|1.3.2|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.| blackarch-defensive |http://www.inetsim.org/ +infection-monkey|v1.8.2.r5124.g594d21559|Automated security testing tool for networks.| blackarch-networking |https://github.com/guardicore/monkey infip|0.1|A python script that checks output from netstat against RBLs from Spamhaus.| blackarch-scanner |http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html infoga|33.79a1c03|Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers).| blackarch-recon |https://github.com/m4ll0k/infoga inguma|0.1.1|A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.| blackarch-cracker |http://inguma.sourceforge.net @@ -1083,7 +1083,7 @@ inquisitor|28.12a9ec1|OSINT Gathering Tool for Companies and Organizations.| bla insanity|117.cf51ff3|Generate Payloads and Control Remote Machines .| blackarch-exploitation |https://github.com/4w4k3/Insanity-Framework instagramosint|20.94213fd|An Instagram Open Source Intelligence Tool.| blackarch-social |https://github.com/sc1341/InstagramOSINT/ instashell|56.49b6b4f|Multi-threaded Instagram Brute Forcer without password limit.| blackarch-cracker |https://github.com/thelinuxchoice/instashell -intelmq|3.0.2.r153.g0221a2507|A tool for collecting and processing security feeds using a message queuing protocol.| blackarch-misc |https://github.com/certtools/intelmq +intelmq|3.0.2.r161.g79cae294a|A tool for collecting and processing security feeds using a message queuing protocol.| blackarch-misc |https://github.com/certtools/intelmq intelplot|12.4dd9fc0|OSINT Tool to Mark Points on Offline Map.| blackarch-recon |https://github.com/itsmehacker/IntelPlot intensio-obfuscator|280.f66a22b|Obfuscate a python code 2 and 3.| blackarch-misc |https://github.com/Hnfull/Intensio-Obfuscator interactsh-client|v1.0.4.r0.g5b7fd9e|Open-Source Solution for Out of band Data Extraction.| blackarch-webapp |https://github.com/projectdiscovery/interactsh @@ -1127,14 +1127,14 @@ isip|2.fad1f10|Interactive sip toolkit for packet manipulations, sniffing, man i isme|0.12|Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN.| blackarch-voip |https://packetstormsecurity.com/files/123534/IP-Phone-Scanning-Made-Easy.12.html isr-form|1.0|Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.| blackarch-recon |http://www.infobyte.com.ar/ issniff|294.79c6c2a|Internet Session Sniffer.| blackarch-sniffer |https://github.com/juphoff/issniff -ivre|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,...| blackarch-recon |https://ivre.rocks/ -ivre-docs|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (documentation)| blackarch-recon |https://ivre.rocks/ -ivre-web|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (web application)| blackarch-recon |https://ivre.rocks/ +ivre|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,...| blackarch-recon |https://ivre.rocks/ +ivre-docs|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (documentation)| blackarch-recon |https://ivre.rocks/ +ivre-web|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (web application)| blackarch-recon |https://ivre.rocks/ ja3|117.cb29184|Standard for creating SSL client fingerprints in an easy to produce and shareable way.| blackarch-crypto |https://github.com/salesforce/ja3 jaadas|0.1|Joint Advanced Defect assEsment for android applications.| blackarch-scanner |https://github.com/flankerhqd/JAADAS/ jackdaw|396.4c06e2b|Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions| blackarch-recon |https://github.com/skelsec/jackdaw jad|1.5.8e|Java decompiler| blackarch-reversing |https://varaneckas.com/jad -jadx|1.4.0|Command line and GUI tools to produce Java source code from Android Dex and APK files| blackarch-decompiler |https://github.com/skylot/jadx +jadx|1.4.1|Command line and GUI tools to produce Java source code from Android Dex and APK files| blackarch-decompiler |https://github.com/skylot/jadx jaeles|218.515484a|The Swiss Army knife for automated Web Application Testing.| blackarch-webapp |https://github.com/jaeles-project/jaeles jaidam|18.15e0fec|Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan.| blackarch-webapp |https://github.com/stasinopoulos/jaidam jast|17.361ecde|Just Another Screenshot Tool.| blackarch-webapp |https://github.com/mikehacksthings/jast @@ -1182,7 +1182,7 @@ justdecompile|22018|The decompilation engine of JustDecompile.| blackarch-window juumla|80.3e1b594|Python tool created to identify Joomla version, scan for vulnerabilities and search for config files.| blackarch-webapp |https://github.com/oppsec/juumla jwscan|7.874b3a5|Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.| blackarch-reversing |https://github.com/katjahahn/JWScan jwt-cracker|23.8130879|JWT brute force cracker written in C.| blackarch-cracker |https://github.com/brendan-rius/c-jwt-cracker -jwt-hack|v1.1.2.r1.g335a7e8|A tool for hacking / security testing to JWT.| blackarch-webapp |https://github.com/hahwul/jwt-hack +jwt-hack|v1.1.2.r2.gcea10a3|A tool for hacking / security testing to JWT.| blackarch-webapp |https://github.com/hahwul/jwt-hack jwt-tool|63.aa496cf|Toolkit for validating, forging and cracking JWTs (JSON Web Tokens).| blackarch-cracker |https://github.com/ticarpi/jwt_tool jwtcat|67.cd461fb|Script performs offline brute-force attacks against JSON Web Token (JWT)| blackarch-cracker |https://github.com/aress31/jwtcat jynx2|2.0|An expansion of the original Jynx LD_PRELOAD rootkit| blackarch-backdoor |http://www.blackhatlibrary.net/Jynx2 @@ -1249,7 +1249,7 @@ ldsview|47.d8bfcaa|Offline search tool for LDAP directory dumps in LDIF format.| leaklooker|5.0d2b9fc|Find open databases with Shodan.| blackarch-scanner |https://github.com/woj-ciech/LeakLooker leena|2.5119f56|Symbolic execution engine for JavaScript| blackarch-binary |https://github.com/mmicu/leena legion|55.df23a34|Automatic Enumeration Tool based in Open Source tools.| blackarch-recon |https://github.com/carlospolop/legion -leo|27765.3f774b09f|Literate programmer's editor, outliner, and project manager.| blackarch-misc |https://github.com/leo-editor/leo-editor/ +leo|28087.1731c35d8|Literate programmer's editor, outliner, and project manager.| blackarch-misc |https://github.com/leo-editor/leo-editor/ leroy-jenkins|3.bdc3965|A python tool that will allow remote execution of commands on a Jenkins server and its nodes.| blackarch-exploitation |https://github.com/captainhooligan/Leroy-Jenkins lethalhta|1.a8d772a|Lateral Movement technique using DCOM and HTA.| blackarch-windows |https://github.com/codewhitesec/LethalHTA letmefuckit-scanner|3.f3be22b|Scanner and Exploit Magento.| blackarch-scanner |https://github.com/onthefrontline/LetMeFuckIt-Scanner @@ -1262,7 +1262,7 @@ lfi-image-helper|0.8|A simple script to infect images with PHP Backdoors for loc lfi-scanner|4.0|This is a simple perl script that enumerates local file inclusion attempts when given a specific target.| blackarch-scanner |http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html lfi-sploiter|1.0|This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.| blackarch-webapp |http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html lfifreak|21.0c6adef|A unique automated LFi Exploiter with Bind/Reverse Shells.| blackarch-webapp |https://github.com/OsandaMalith/LFiFreak/ -lfimap|115.bceb90c|Local file inclusion discovery and exploitation tool.| blackarch-webapp |https://github.com/hansmach1ne/lfimap +lfimap|118.7f47578|Local file inclusion discovery and exploitation tool.| blackarch-webapp |https://github.com/hansmach1ne/lfimap lfisuite|85.470e01f|Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner.| blackarch-scanner |https://github.com/D35m0nd142/LFISuite lfle|24.f28592c|Recover event log entries from an image by heurisitically looking for record structures.| blackarch-forensic |https://github.com/williballenthin/LfLe lft|3.91|A layer four traceroute implementing numerous other features.| blackarch-recon |http://pwhois.org/lft/ @@ -1288,7 +1288,7 @@ linset|9.8746b1f|Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.| b linux-exploit-suggester|32.9db2f5a|A Perl script that tries to suggest exploits based OS version number.| blackarch-recon |https://github.com/PenturaLabs/Linux_Exploit_Suggester linux-exploit-suggester.sh|164.54a5c01|Linux privilege escalation auditing tool.| blackarch-recon |https://github.com/mzet-/linux-exploit-suggester linux-inject|100.268d4e4|Tool for injecting a shared object into a Linux process.| blackarch-backdoor |https://github.com/gaffe23/linux-inject -linux-smart-enumeration|244.9e07dbe|Linux enumeration tool for pentesting and CTFs with verbosity levels.| blackarch-scanner |https://github.com/diego-treitos/linux-smart-enumeration +linux-smart-enumeration|249.3395ee7|Linux enumeration tool for pentesting and CTFs with verbosity levels.| blackarch-scanner |https://github.com/diego-treitos/linux-smart-enumeration lisa.py|61.2d1f81a|An Exploit Dev Swiss Army Knife.| blackarch-exploitation |https://github.com/ant4g0nist/lisa.py list-urls|0.1|Extracts links from webpage.| blackarch-webapp |http://www.whoppix.net/ littleblackbox|0.1.3|Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.| blackarch-scanner |http://code.google.com/p/littleblackbox/wiki/FAQ @@ -1341,7 +1341,7 @@ mallory|134.47094fb|HTTP/HTTPS proxy over SSH.| blackarch-proxy |https://github. malmon|0.3|Hosting exploit/backdoor detection daemon.| blackarch-defensive |http://sourceforge.net/projects/malmon/ malscan|5.773505a|A Simple PE File Heuristics Scanner.| blackarch-malware |https://github.com/Ice3man543/MalScan maltego|4.3.0|An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.| blackarch-forensic |http://www.paterva.com/web5 -maltrail|76653.8bbaac57f1|Malicious traffic detection system.| blackarch-defensive |https://github.com/stamparm/maltrail +maltrail|77078.8a1cd3d0fe|Malicious traffic detection system.| blackarch-defensive |https://github.com/stamparm/maltrail maltrieve|342.b9e7560|Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.| blackarch-malware |https://github.com/technoskald/maltrieve malware-check-tool|1.2|Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.| blackarch-malware |http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html malwareanalyser|3.3|A freeware tool to perform static and dynamic analysis on malware.| blackarch-windows |http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html @@ -1351,7 +1351,7 @@ malybuzz|1.0|A Python tool focused in discovering programming faults in network mana|68.56bcfcd|A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.| blackarch-wireless |https://github.com/sensepost/mana mando.me|9.8b34f1a|Web Command Injection Tool.| blackarch-webapp |https://github.com/z0noxz/mando.me manspider|56.e10bb6a|Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!| blackarch-scanner |https://github.com/blacklanternsecurity/MANSPIDER -manticore|0.2.4.r343.g9e11bc9a|Symbolic execution tool.| blackarch-binary |https://github.com/trailofbits/manticore +manticore|0.2.4.r346.gdc998800|Symbolic execution tool.| blackarch-binary |https://github.com/trailofbits/manticore manul|197.f525df9|A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS.| blackarch-fuzzer |https://github.com/mxmssh/manul mara-framework|176.ac4ac88|A Mobile Application Reverse engineering and Analysis Framework.| blackarch-mobile |https://github.com/xtiankisutsa/MARA_Framework marc4dasm|6.f11860f|This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).| blackarch-disassembler |https://github.com/ApertureLabsLtd/marc4dasm @@ -1384,13 +1384,13 @@ memfetch|0.05b|Dumps any userspace process memory without affecting its executio memimager|1.0|Performs a memory dump using NtSystemDebugControl.| blackarch-windows |http://ntsecurity.nu/toolbox/memimager/ mentalist|6.953a07b|Graphical tool for custom wordlist generation.| blackarch-automation |https://github.com/sc0tfree/mentalist merlin-server|1.3.0|Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.| blackarch-automation |https://github.com/Ne0nd0g/merlin -metabigor|51.3406d87|Intelligence Tool but without API key.| blackarch-recon |https://github.com/j3ssie/metabigor +metabigor|54.7b8c30e|Intelligence Tool but without API key.| blackarch-recon |https://github.com/j3ssie/metabigor metacoretex|0.8.0|MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.| blackarch-database |http://metacoretex.sourceforge.net/ metafinder|v1.2.r0.g2caed73|Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata.| blackarch-recon |https://github.com/Josue87/MetaFinder metaforge|115.7b32693|Auto Scanning to SSL Vulnerability.| blackarch-misc |https://github.com/chriswmorris/Metaforge metagoofil|71.036ea11|An information gathering tool designed for extracting metadata of public documents.| blackarch-recon |http://www.edge-security.com/metagoofil.php metame|14.8d583a0|A simple metamorphic code engine for arbitrary executables.| blackarch-binary |https://github.com/a0rtega/metame -metasploit|6.1.35|Advanced open-source platform for developing, testing, and using exploit code| blackarch-exploitation |https://www.metasploit.com/ +metasploit|6.2.0|Advanced open-source platform for developing, testing, and using exploit code| blackarch-exploitation |https://www.metasploit.com/ metasploit-autopwn|12.09320cc|db_autopwn plugin of metasploit.| blackarch-automation |https://github.com/hahwul/metasploit-autopwn meterssh|18.9a5ed19|A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.| blackarch-backdoor |https://github.com/trustedsec/meterssh metoscan|05|Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.| blackarch-webapp |http://www.open-labs.org/ @@ -1452,7 +1452,7 @@ mptcp|1.9.0|A tool for manipulation of raw packets that allows a large number of mptcp-abuse|6.b0eeb27|A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.| blackarch-networking |https://github.com/Neohapsis/mptcp-abuse mqtt-pwn|43.40368e5|A one-stop-shop for IoT Broker penetration-testing and security assessment operations.| blackarch-scanner |https://github.com/akamai-threat-research/mqtt-pwn mrsip|110.bdd98ad|SIP-Based Audit and Attack Tool.| blackarch-voip |https://github.com/meliht/mr.sip -mrtparse|518.a9081fc|A module to read and analyze the MRT format data.| blackarch-misc |https://github.com/YoshiyukiYamauchi/mrtparse +mrtparse|519.9fa94ea|A module to read and analyze the MRT format data.| blackarch-misc |https://github.com/YoshiyukiYamauchi/mrtparse ms-sys|2.7.0|A tool to write Win9x- master boot records (mbr) under linux - RTM!| blackarch-backdoor |http://ms-sys.sourceforge.net/ msf-mpc|35.8007ef2|Msfvenom payload creator.| blackarch-automation |https://github.com/g0tmi1k/mpc msfdb|16.09c603b|Manage the metasploit framework database.| blackarch-misc |https://github.com/BlackArch/msfdb @@ -1572,12 +1572,12 @@ ntp-fingerprint|0.1|An active fingerprinting utility specifically designed to id ntp-ip-enum|0.1|Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.| blackarch-recon |http://www.securepla.net/ ntpdos|4.3fe389b|PoC for distributed NTP reflection DoS (CVE-5211)| blackarch-dos |https://github.com/sepehrdaddev/ntpdos nuclei|v2.7.1.r0.ga31bca52|A fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.| blackarch-webapp |https://github.com/projectdiscovery/nuclei -nuclei-templates|v9.0.2.r74.g58ed276bf|Community curated list of template files for the nuclei engine.|blackarch-scanner|https://github.com/projectdiscovery/nuclei-templates.git +nuclei-templates|v9.0.4.r611.g9b6fed937|Community curated list of template files for the nuclei engine.|blackarch-scanner|https://github.com/projectdiscovery/nuclei-templates.git nullinux|121.b2f1829|Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions.| blackarch-recon |https://github.com/m8r0wn/nullinux nullscan|1.0.1|A modular framework designed to chain and automate security tests.| blackarch-automation |http://www.nullsecurity.net/tools/automation.html nxcrypt|32.6ae06b5|NXcrypt - python backdoor framework.| blackarch-backdoor |https://github.com/Hadi999/NXcrypt nzyme|1.2.2|WiFi defense system.| blackarch-wireless |https://www.nzyme.org/download -o-saft|4664.fb28299|A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.| blackarch-scanner |https://www.owasp.org/index.php/O-Saft +o-saft|4665.1564cfe|A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.| blackarch-scanner |https://www.owasp.org/index.php/O-Saft o365enum|17.2d4f99c|Username enumeration and password enuming tool aimed at Microsoft O365.| blackarch-cracker |https://github.com/gremwell/o365enum o365spray|129.a585432|Username enumeration and password spraying tool aimed at Microsoft O365.| blackarch-cracker |https://github.com/0xZDH/o365spray oat|1.3.1|A toolkit that could be used to audit security within Oracle database servers.| blackarch-fuzzer |http://www.cqure.net/wp/test/ @@ -1605,10 +1605,10 @@ oniongrok|v1.0.9.r0.g5e74e1a|Onion addresses for anything.| blackarch-tunnel |ht onionscan|130.da42865|Scan Onion Services for Security Issues.| blackarch-scanner |https://github.com/s-rah/onionscan onionsearch|41.caf23e4|Script that scrapes urls on different ".onion" search engines.| blackarch-webapp |https://github.com/megadose/OnionSearch onionshare|2.5|Share a file over Tor Hidden Services anonymously and securely| blackarch-defensive |https://github.com/onionshare/onionshare -open-iscsi|2.1.6|iSCSI userland tools| blackarch-misc |https://www.open-iscsi.com/ +open-iscsi|2.1.7|iSCSI userland tools| blackarch-misc |https://www.open-iscsi.com/ opendoor|420.fbdffd1|OWASP WEB Directory Scanner.| blackarch-webapp |https://github.com/stanislav-web/OpenDoor openpuff|4.01|Yet not another steganography SW.| blackarch-stego |https://embeddedsw.net/OpenPuff_Steganography_Home.html -openscap|1.3.6.r37.g39e96abd4|Open Source Security Compliance Solution.| blackarch-automation |https://www.open-scap.org/ +openscap|1.3.6.r42.g72dd8ba0f|Open Source Security Compliance Solution.| blackarch-automation |https://www.open-scap.org/ openstego|0.8.4|A tool implemented in Java for generic steganography, with support for password-based encryption of the data.| blackarch-crypto |https://github.com/syvaidya/openstego/releases opensvp|65.df54ed8|A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.| blackarch-exploitation |https://github.com/regit/opensvp openvas-scanner|21.4.4|The OpenVAS scanning Daemon.| blackarch-scanner |https://github.com/greenbone/openvas-scanner/ @@ -1639,7 +1639,7 @@ packer|1.8.1|tool for creating identical machine images for multiple platforms f packerid|1.4|Script which uses a PEiD database to identify which packer (if any) is being used by a binary.| blackarch-binary |http://handlers.sans.org/jclausing/ packet-o-matic|351|A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.| blackarch-networking |http://www.packet-o-matic.org/ packeth|2.1|Linux GUI packet generator tool for ethernet| blackarch-networking |http://packeth.sourceforge.net/ -packetq|272.f0ce9ae|A tool that provides a basic SQL-frontend to PCAP-files.| blackarch-networking |https://github.com/DNS-OARC/PacketQ +packetq|276.260ee20|A tool that provides a basic SQL-frontend to PCAP-files.| blackarch-networking |https://github.com/DNS-OARC/PacketQ packetsender|770.c907ae8|An open source utility to allow sending and receiving TCP and UDP packets.| blackarch-networking |https://github.com/dannagle/PacketSender packit|1.0|A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.| blackarch-networking |http://packit.sourceforge.net/ pacu|1056.866376c|The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.| blackarch-exploitation |https://github.com/RhinoSecurityLabs/pacu @@ -1670,7 +1670,7 @@ patator|214.b97f8b2|A multi-purpose bruteforcer.| blackarch-cracker |https://git patchkit|37.95dc699|Powerful binary patching from Python.| blackarch-binary |https://github.com/lunixbochs/patchkit pathzuzu|64.4f4533c|Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables.| blackarch-exploitation |https://github.com/ShotokanZH/Pa-th-zuzu payloadmask|17.58e0525|Web Payload list editor to use techniques to try bypass web application firewall.| blackarch-webapp |https://github.com/CoolerVoid/payloadmask -payloadsallthethings|1402.12ee527|A list of useful payloads and bypass for Web Application Security and Pentest/CTF.| blackarch-misc |https://github.com/swisskyrepo/PayloadsAllTheThings/ +payloadsallthethings|1407.3066615|A list of useful payloads and bypass for Web Application Security and Pentest/CTF.| blackarch-misc |https://github.com/swisskyrepo/PayloadsAllTheThings/ pblind|1.0|Little utility to help exploiting blind sql injection vulnerabilities.| blackarch-exploitation |http://www.edge-security.com/pblind.php pbscan|10.566c3d7|Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.| blackarch-scanner |https://github.com/gvb84/pbscan pcapfex|60.c51055a|Packet CAPture Forensic Evidence eXtractor.| blackarch-networking |https://github.com/vikwin/pcapfex @@ -1721,7 +1721,7 @@ phantom-evasion|103.2cd0673|Antivirus evasion tool written in python.| blackarch phemail|28.302b24d|A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.| blackarch-social |https://github.com/Dionach/PhEmail phishery|14.5743953|An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector.| blackarch-backdoor |https://github.com/ryhanson/phishery phishingkithunter|20.ac9bd1e|Find phishing kits which use your brand/organization's files and image'.| blackarch-social |https://github.com/t4d/PhishingKitHunter -phoneinfoga|v2.4.2.r25.g503e24c|Information gathering & OSINT framework for phone numbers.| blackarch-social |https://github.com/sundowndev/PhoneInfoga +phoneinfoga|v2.4.3.r2.gd7e6e84|Information gathering & OSINT framework for phone numbers.| blackarch-social |https://github.com/sundowndev/PhoneInfoga phonesploit|51.0193f9e|Adb exploiting tools.| blackarch-mobile |https://github.com/metachar/PhoneSploit phonia|593.8ae14ff|Advanced toolkits to scan phone numbers using only free resources.| blackarch-social |https://github.com/entynetproject/phonia phoss|0.1.13|Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.| blackarch-cracker |http://www.phenoelit.org/fr/tools.html @@ -1731,9 +1731,9 @@ php-malware-finder|0.3.4.r74.g48936ef|Detect potentially malicious PHP files.| b php-mt-seed|4.0|PHP mt_rand() seed cracker.| blackarch-cracker |http://www.openwall.com/php_mt_seed/ php-rfi-payload-decoder|30.bd42caa|Decode and analyze RFI payloads developed in PHP.| blackarch-cracker |https://github.com/bwall/PHP-RFI-Payload-Decoder php-vulnerability-hunter|1.4.0.20|An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.| blackarch-windows |https://phpvulnhunter.codeplex.com/ -phpggc|382.80fc022|A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.| blackarch-webapp |https://github.com/ambionics/phpggc -phpsploit|972.ee83c32|Stealth post-exploitation framework.| blackarch-webapp |https://github.com/nil0x42/phpsploit -phpstan|7600.c84e0d402|PHP Static Analysis Tool - discover bugs in your code without running it.| blackarch-code-audit |https://github.com/phpstan/phpstan +phpggc|389.5589874|A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.| blackarch-webapp |https://github.com/ambionics/phpggc +phpsploit|979.7dabcad|Stealth post-exploitation framework.| blackarch-webapp |https://github.com/nil0x42/phpsploit +phpstan|7702.22e755948|PHP Static Analysis Tool - discover bugs in your code without running it.| blackarch-code-audit |https://github.com/phpstan/phpstan phpstress|5.f987a7e|A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.| blackarch-dos |https://github.com/nightlionsecurity/phpstress phrasendrescher|1.2.2c|A modular and multi processing pass phrase cracking tool.| blackarch-cracker |http://www.leidecker.info/projects/phrasendrescher/ pidense|29.ef26704|Monitor illegal wireless network activities. (Fake Access Points)| blackarch-wireless |https://github.com/WiPi-Hunter/PiDense @@ -1748,7 +1748,7 @@ pirana|0.3.1|Exploitation framework that tests the security of a email content f pivotsuite|19.9078d1e|A portable, platform independent and powerful network pivoting toolkit.| blackarch-networking |https://github.com/RedTeamOperations/PivotSuite pixd|7.873db72|Colourful visualization tool for binary files.| blackarch-binary |https://github.com/FireyFly/pixd pixiewps|1.4.2|Offline bruteforce of the WPS pin exploiting the low or non-existing entropy of some APs| blackarch-wireless |https://github.com/wiire/pixiewps -pixload|74.d6b87f5|Image Payload Creating/Injecting tools.| blackarch-webapp |https://github.com/chinarulezzz/pixload +pixload|77.d9645fb|Image Payload Creating/Injecting tools.| blackarch-webapp |https://github.com/chinarulezzz/pixload pkcrack|1.2.2|A PkZip encryption cracker.| blackarch-cracker |https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack/download1.html pkinittools|8.0f7f9a5|Tools for Kerberos PKINIT and relaying to AD CS.| blackarch-exploitation |https://github.com/dirkjanm/PKINITtools pkt2flow|69.868a2e8|A simple utility to classify packets into flows.| blackarch-networking |https://github.com/caesar0301/pkt2flow @@ -1787,15 +1787,15 @@ powerstager|14.0149dc9|A payload stager using PowerShell.| blackarch-binary |htt pown|162.1036e02|Security testing and exploitation toolkit built on top of Node.js and NPM.| blackarch-webapp |https://github.com/pownjs/pown ppee|1.12|A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details.| blackarch-windows |https://www.mzrst.com/ ppfuzz|24.0c3c526|A fast tool to scan client-side prototype pollution vulnerability written in Rust.| blackarch-webapp |https://github.com/dwisiswant0/ppfuzz -ppmap|v1.2.0.r13.gb27c3a3|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.| blackarch-webapp |https://github.com/kleiton0x00/ppmap +ppmap|v1.2.0.r14.g42011bd|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.| blackarch-webapp |https://github.com/kleiton0x00/ppmap ppscan|0.3|Yet another port scanner with HTTP and FTP tunneling support.| blackarch-scanner |https://packetstormsecurity.com/files/82897/PPScan-Portscanner.3.html pr0cks|20.c98188b|python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target.| blackarch-proxy |https://github.com/n1nj4sec/pr0cks prads|1132.e631f4f|A "Passive Real-time Asset Detection System".| blackarch-scanner |http://gamelinux.github.io/prads/ praeda|48.1dc2220|An automated data/information harvesting tool designed to gather critical information from various embedded devices.| blackarch-scanner |https://github.com/percx/Praeda preeny|110.aaef77f|Some helpful preload libraries for pwning stuff.| blackarch-exploitation |https://github.com/zardus/preeny -pret|100.a5dd92f|Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.| blackarch-exploitation |https://github.com/RUB-NDS/PRET +pret|102.638caad|Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.| blackarch-exploitation |https://github.com/RUB-NDS/PRET princeprocessor|132.bffda8c|Standalone password candidate generator using the PRINCE algorithm.| blackarch-misc |https://github.com/jsteube/princeprocessor/ -procdump|53.7ae6126|Generate coredumps based off performance triggers.| blackarch-binary |https://github.com/Microsoft/ProcDump-for-Linux +procdump|54.569883d|Generate coredumps based off performance triggers.| blackarch-binary |https://github.com/Microsoft/ProcDump-for-Linux proctal|482.67bf7e8|Provides a command line interface and a C library to manipulate the address space of a running program on Linux.| blackarch-binary |https://github.com/daniel-araujo/proctal procyon|0.6|A suite of Java metaprogramming tools focused on code generation and analysis.| blackarch-decompiler |https://github.com/mstrobel/procyon profuzz|9.aa6dded|Simple PROFINET fuzzer based on Scapy.| blackarch-fuzzer |https://github.com/HSASec/ProFuzz @@ -1804,7 +1804,7 @@ promiscdetect|1.0|Checks if your network adapter(s) is running in promiscuous mo propecia|2|A fast class scanner that scans for a specified open port with banner grabbing| blackarch-fingerprint |http://www.redlevel.org protos-sip|2|SIP test suite.| blackarch-voip |https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip protosint|26.1ee6ee4|Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses.| blackarch-recon |https://github.com/pixelbubble/ProtOSINT -prowler|1898.d307898|Tool for AWS security assessment, auditing and hardening.| blackarch-defensive |https://github.com/alfresco/prowler +prowler|1919.7930b44|Tool for AWS security assessment, auditing and hardening.| blackarch-defensive |https://github.com/alfresco/prowler proxenet|712.67fc6b5|THE REAL hacker friendly proxy for web application pentests.| blackarch-webapp |https://github.com/hugsy/proxenet proxify|160.688e448|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.| blackarch-proxy |https://github.com/projectdiscovery/proxify proxmark|2413.61163344|A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.| blackarch-radio |https://github.com/Proxmark/proxmark3 @@ -1840,7 +1840,7 @@ pwncat-caleb|v0.5.4.r11.g37f04d4|A post-exploitation platform.| blackarch-exploi pwndbg|2022.01.05|Makes debugging with GDB suck less| blackarch-debugger |https://github.com/pwndbg/pwndbg pwndora|248.d3f676a|Massive IPv4 scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home.| blackarch-scanner |https://github.com/alechilczenko/pwndora pwndrop|18.385ba70|Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.| blackarch-webapp |https://github.com/kgretzky/pwndrop -pwned|1689.39a74a6|A command-line tool for querying the 'Have I been pwned?' service.| blackarch-recon |https://github.com/wKovacs64/pwned +pwned|1701.e1a46a1|A command-line tool for querying the 'Have I been pwned?' service.| blackarch-recon |https://github.com/wKovacs64/pwned pwned-search|40.04c1439|Pwned Password API lookup.| blackarch-recon |https://github.com/mikepound/pwned-search pwnedornot|145.a082e6c|Tool to find passwords for compromised email addresses.| blackarch-recon |https://github.com/thewhiteh4t/pwnedOrNot pwnedpasswords|2.0.0.r0.g717702e|Generate and verify pwnedpasswords check digits.| blackarch-misc |https://github.com/lionheart/pwnedpasswords @@ -1870,10 +1870,10 @@ python-api-dnsdumpster|76.fa952c6|Unofficial Python API for http://dnsdumpster.c python-arsenic|19.1|Async WebDriver implementation for asyncio and asyncio-compatible frameworks.| blackarch-automation |https://github.com/HDE/arsenic/releases python-capstone|4.0.2|Lightweight multi-platform, multi-architecture disassembly framework| blackarch-reversing |https://www.capstone-engine.org/index.html python-cymruwhois|1.6|Python client for the whois.cymru.com service| blackarch-networking |https://pypi.org/project/cymruwhois/#files -python-frida|15.1.22|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.| blackarch-reversing |https://pypi.org/project/frida/#files -python-frida-tools|10.6.1|Frida CLI tools.| blackarch-mobile |https://pypi.org/project/frida-tools/#files +python-frida|15.1.24|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.| blackarch-reversing |https://pypi.org/project/frida/#files +python-frida-tools|10.6.2|Frida CLI tools.| blackarch-mobile |https://pypi.org/project/frida-tools/#files python-google-streetview|1.2.9|A command line tool and module for Google Street View Image API.| blackarch-misc |https://pypi.org/project/google-streetview/#files -python-ivre|0.9.17.dev302|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)| blackarch-recon |https://ivre.rocks/ +python-ivre|0.9.17.dev344|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)| blackarch-recon |https://ivre.rocks/ python-jsbeautifier|1.14.3|JavaScript unobfuscator and beautifier| blackarch-reversing |https://github.com/beautify-web/js-beautify python-keylogger|2.7.3|Simple keystroke logger.| blackarch-keylogger |https://github.com/GiacomoLaw/Keylogger python-minidump|0.0.21|Python library to parse and read Microsoft minidump file format.| blackarch-windows |https://pypi.org/project/minidump/#files @@ -1882,7 +1882,7 @@ python-oletools|0.60|Tools to analyze Microsoft OLE2 files.| blackarch-binary |h python-pcodedmp|1.2.6|A VBA p-code disassembler.| blackarch-disassembler |https://pypi.org/project/pcodedmp/#files python-search-engine-parser|0.6.6|Scrapes search engine pages for query titles, descriptions and links.| |https://pypi.org/project/search-engine-parser/#files python-shodan|1.27.0|The official Python library and CLI for Shodan| blackarch-recon |https://shodan.readthedocs.io/ -python-ssh-mitm|2.0.0|SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation.| blackarch-exploitation |https://pypi.org/project/ssh-mitm/#files +python-ssh-mitm|2.0.3|SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation.| blackarch-exploitation |https://pypi.org/project/ssh-mitm/#files python-trackerjacker|1.9.0|Finds and tracks wifi devices through raw 802.11 monitoring.| blackarch-wireless |https://github.com/calebmadrigal/trackerjacker python-uncompyle6|3.8.0|A Python cross-version decompiler.| blackarch-decompiler |https://pypi.org/project/uncompyle6/#files python-utidylib|0.2|Python bindings for Tidy HTML parser/cleaner.| blackarch-misc |http://utidylib.berlios.de @@ -1893,8 +1893,8 @@ python2-capstone|4.0.1|A disassembly framework with the target of becoming the u python2-cymruwhois|1.6|Python client for the whois.cymru.com service| blackarch-networking |https://pypi.org/project/cymruwhois/#files python2-darts.util.lru|7.5ef01b1|Simple dictionary with LRU behaviour.| blackarch-misc |https://pypi.python.org/pypi/darts.util.lru python2-exrex|144.9a66706|Irregular methods on regular expressions.| blackarch-misc |https://github.com/asciimoo/exrex -python2-frida|15.1.22|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.| blackarch-reversing |https://pypi.org/project/frida/#files -python2-frida-tools|10.6.1|Frida CLI tools.| blackarch-mobile |https://pypi.org/project/frida-tools/#files +python2-frida|15.1.24|Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.| blackarch-reversing |https://pypi.org/project/frida/#files +python2-frida-tools|10.6.2|Frida CLI tools.| blackarch-mobile |https://pypi.org/project/frida-tools/#files python2-google-streetview|1.2.9|A command line tool and module for Google Street View Image API.| blackarch-misc |https://pypi.org/project/google-streetview/#files python2-hpfeeds|411.539e738|Honeynet Project generic authenticated datafeed protocol.| blackarch-honeypot |https://github.com/rep/hpfeeds python2-ivre|0.9.16.dev26|Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (library)| blackarch-recon |https://ivre.rocks/ @@ -1917,7 +1917,7 @@ quickrecon|0.3.2|A python script for simple information gathering. It attempts t quicksand-lite|32.42af152|Command line tool for scanning streams within office documents plus xor db attack.| blackarch-defensive |https://github.com/tylabs/quicksand_lite quickscope|332.700a671|Statically analyze windows, linux, osx, executables and also APK files.| blackarch-binary |https://github.com/CYB3RMX/Qu1cksc0pe r2ghidra|5.6.2.r1.ga4ba1ddc|Deep ghidra decompiler integration for radare2 and iaito| blackarch-reversing |https://github.com/radareorg/r2ghidra -rabid|v0.1.0.r10.g98209bc|A CLI tool and library allowing to simply decode all kind of BigIP cookies| blackarch-webapp |https://noraj.github.io/rabid/ +rabid|v0.1.0.r12.g1d71ea2|A CLI tool and library allowing to simply decode all kind of BigIP cookies| blackarch-webapp |https://noraj.github.io/rabid/ raccoon|187.9cf6c11|A high performance offensive security tool for reconnaissance and vulnerability scanning.| blackarch-recon |https://github.com/evyatarmeged/Raccoon radamsa|0.6|General purpose mutation based fuzzer| blackarch-fuzzer |https://gitlab.com/akihe/radamsa radare2|5.6.6|Open-source tools to disasm, debug, analyze and manipulate binary files| blackarch-reversing |https://radare.org @@ -1977,9 +1977,9 @@ remot3d|38.a707ef7|An Simple Exploit for PHP Language.| blackarch-webapp |https: replayproxy|1.1|Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file.| blackarch-forensic |https://code.google.com/p/replayproxy/ resourcehacker|5.1.8|Resource compiler and decompiler for Windows® applications.| blackarch-windows |http://www.angusj.com/resourcehacker/ responder|v3.1.2.0.r7.g983a1c6|A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2 (multirelay version).| blackarch-scanner |https://github.com/lgandx/Responder -restler-fuzzer|v8.5.0.r15.g2ee8783|First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.| blackarch-webapp |https://github.com/microsoft/restler-fuzzer +restler-fuzzer|v8.5.0.r16.g1bd7bc6|First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.| blackarch-webapp |https://github.com/microsoft/restler-fuzzer retdec|2033.f9ac9ec7|Retargetable machine-code decompiler based on LLVM.| blackarch-decompiler |https://retdec.com/ -retire|3.0.7.r10.gd5027e4|Scanner detecting the use of JavaScript libraries with known vulnerabilities.| blackarch-scanner |http://retirejs.github.io/retire.js/ +retire|3.0.7.r11.gf491d25|Scanner detecting the use of JavaScript libraries with known vulnerabilities.| blackarch-scanner |http://retirejs.github.io/retire.js/ reverseip|13.42cc9c3|Ruby based reverse IP-lookup tool.| blackarch-recon |https://github.com/lolwaleet/ReverseIP revipd|5.2aaacfb|A simple reverse IP domain scanner.| blackarch-recon |https://github.com/PypeRanger/revipd revsh|215.174e309|A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.| blackarch-backdoor |https://github.com/emptymonkey/revsh/ @@ -2003,7 +2003,7 @@ rlogin-scanner|0.2|Multithreaded rlogin scanner. Tested on Linux, OpenBSD and So rmiscout|1.4|Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities.| blackarch-exploitation |https://github.com/BishopFox/rmiscout rogue-mysql-server|2.78ebbfc|A rogue MySQL server written in Python.| blackarch-misc |https://github.com/Gifts/Rogue-MySql-Server roguehostapd|78.381b373|Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.| blackarch-wireless |https://github.com/wifiphisher/roguehostapd -rombuster|184.aefb0ef|A router exploitation tool that allows to disclosure network router admin password.| blackarch-exploitation |https://github.com/EntySec/RomBuster +rombuster|194.93f4fe4|A router exploitation tool that allows to disclosure network router admin password.| blackarch-exploitation |https://github.com/EntySec/RomBuster rootbrute|0.1|Local root account bruteforcer.| blackarch-cracker |http://www.packetstormsecurity.org/ ropeadope|1.1|A linux log cleaner.| blackarch-anti-forensic |http://www.highhacksociety.com/ ropeme|4.9b3a8fd|A set of python scripts to generate ROP gadgets and payload.| blackarch-exploitation |http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/ @@ -2018,7 +2018,7 @@ rpcsniffer|7.9fab095|Sniffs WINDOWS RPC messages in a given RPC server process.| rpctools|1.0|Contains three separate tools for obtaining information from a system that is running RPC services| blackarch-windows |https://packetstormsecurity.com/files/31879/rpctools.0.zip.html rpdscan|2.a71b0f3|Remmina Password Decoder and scanner.| blackarch-cracker |https://github.com/freakyclown/RPDscan rpivot|5.4963487|Socks4 reverse proxy for penetration testing.| blackarch-proxy |https://github.com/artkond/rpivot -rr|6000.c95a2d5e|A Record and Replay Framework.| blackarch-debugger |https://github.com/mozilla/rr +rr|6009.68fe9b74|A Record and Replay Framework.| blackarch-debugger |https://github.com/mozilla/rr rrs|1.70|A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more.| blackarch-backdoor |http://www.cycom.se/dl/rrs rsactftool|684.4c2c22d|RSA tool for ctf - retrieve private key from weak public key and/or uncipher data.| blackarch-crypto |https://github.com/Ganapati/RsaCtfTool rsakeyfind|1.0|A tool to find RSA key in RAM.| blackarch-cracker |http://citp.princeton.edu/memory/code/ @@ -2160,7 +2160,7 @@ simpleemailspoofer|54.7075f0c|A simple Python CLI to spoof emails.| blackarch-so simplify|1.3.0|Generic Android Deobfuscator.| blackarch-mobile |https://github.com/CalebFenton/simplify simplyemail|1.4.10.r7.6a42d37|Email recon made fast and easy, with a framework to build on CyberSyndicates| blackarch-recon |https://github.com/killswitch-GUI/SimplyEmail simtrace2|1046.9088ca8|Host utilities to communicate with SIMtrace2 USB Devices.| blackarch-radio |https://osmocom.org/projects/simtrace2/wiki -sinfp|1.24|A full operating system stack fingerprinting suite.| blackarch-fingerprint |http://www.networecon.com/tools/sinfp/ +sinfp|1.24|A full operating system stack fingerprinting suite.| blackarch-fingerprint |https://cpan.metacpan.org/authors/id/G/GO/GOMOR/ siparmyknife|11232011|A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.| blackarch-voip |http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt sipbrute|11.5be2fdd|A utility to perform dictionary attacks against the VoIP SIP Register hash.| blackarch-voip |https://github.com/packetassailant/sipbrute sipcrack|0.2|A SIP protocol login cracker.| blackarch-cracker |http://www.remote-exploit.org/codes_sipcrack.html @@ -2264,7 +2264,7 @@ spectools|2010_04_R1|Spectrum-Tools is a set of utilities for using the Wi-Spy U speedpwn|8.3dd2793|An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.| blackarch-cracker |https://gitorious.org/speedpwn/ spf|85.344ac2f|A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises.| blackarch-social |https://github.com/tatanus/SPF spfmap|8.a42d15a|A program to map out SPF and DKIM records for a large number of domains.| blackarch-recon |https://github.com/BishopFox/spfmap -spiderfoot|3.5|The Open Source Footprinting Tool.| blackarch-recon |https://github.com/smicallef/spiderfoot +spiderfoot|4.0|The Open Source Footprinting Tool.| blackarch-recon |https://github.com/smicallef/spiderfoot spiderpig-pdffuzzer|0.1|A javascript pdf fuzzer| blackarch-fuzzer |https://code.google.com/p/spiderpig-pdffuzzer/ spiga|623.8bc1ddc|Configurable web resource scanner.| blackarch-webapp |https://github.com/getdual/scripts-n-tools/blob/master/spiga.py spike-fuzzer|2.9|IMMUNITYsec's fuzzer creation kit in C.| blackarch-fuzzer |http://www.immunitysec.com/resources-freesoftware.shtml @@ -2277,8 +2277,8 @@ sploitego|153.d9568dc|Maltego Penetration Testing Transforms.| blackarch-fuzzer spoofcheck|16.8cce591|Simple script that checks a domain for email protections.| blackarch-recon |https://github.com/bishopfox/spoofcheck spooftooph|0.5.2|Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight.| blackarch-bluetooth |http://www.hackfromacave.com/projects/spooftooph.html spookflare|24.19491b5|Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.| blackarch-automation |https://github.com/hlldz/SpookFlare -spotbugs|16787.68e7dca67|A tool for static analysis to look for bugs in Java code.| blackarch-code-audit |https://github.com/spotbugs/spotbugs -spray365|31.8a339b7|Makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach.| blackarch-cracker |https://github.com/MarkoH17/Spray365 +spotbugs|16788.7ba0e74fa|A tool for static analysis to look for bugs in Java code.| blackarch-code-audit |https://github.com/spotbugs/spotbugs +spray365|40.342fbf0|Makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach.| blackarch-cracker |https://github.com/MarkoH17/Spray365 spraycharles|192.5a76852|Low and slow password spraying tool, designed to spray on an interval over a long period of time.| blackarch-cracker |https://github.com/Tw1sm/spraycharles sprayingtoolkit|58.68f295d|Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient.| blackarch-webapp |https://github.com/byt3bl33d3r/SprayingToolkit spraykatz|62.1fb3aa7|Credentials gathering tool automating remote procdump and parse of lsass process.| blackarch-exploitation |https://github.com/aas-n/spraykatz @@ -2370,8 +2370,8 @@ sucrack|1.2.3|A multi-threaded Linux/UNIX tool for brute-force cracking local us suid3num|60.2241c9c|Python script which utilizes python's built-in modules to enumerate SUID binaries.| blackarch-exploitation |https://github.com/Anon-Exploiter/SUID3NUM sulley|1.0.bff0dd1|A pure-python fully automated and unattended fuzzing framework.| blackarch-fuzzer |https://github.com/OpenRCE/sulley/ superscan|4.1|Powerful TCP port scanner, pinger, resolver.| blackarch-windows |http://www.foundstone.com/us/resources/proddesc/superscan.htm -suricata|6.0.4|An Open Source Next Generation Intrusion Detection and Prevention Engine.| blackarch-defensive |https://suricata-ids.org/ -suricata-verify|736.fa5a4ac|Suricata Verification Tests - Testing Suricata Output.| blackarch-misc |https://github.com/OISF/suricata-verify +suricata|6.0.5|An Open Source Next Generation Intrusion Detection and Prevention Engine.| blackarch-defensive |https://suricata.io/download/ +suricata-verify|743.ec41a13|Suricata Verification Tests - Testing Suricata Output.| blackarch-misc |https://github.com/OISF/suricata-verify svn-extractor|42.c27831c|A simple script to extract all web resources by means of .SVN folder exposed over network.| blackarch-recon |https://github.com/anantshri/svn-extractor swaks|20201014.0|Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH| blackarch-networking |https://jetmore.org/john/code/swaks/ swamp|59.3c8be65|An OSINT tool for discovering associated sites through Google Analytics Tracking IDs.| blackarch-recon |https://github.com/jakecreps/swamp @@ -2421,7 +2421,7 @@ tempomail|25.3ca0fcf|Tool to create a temporary email address in 1 Second and re termineter|203.9311d6d|Smart meter testing framework.| blackarch-fuzzer |https://code.google.com/p/termineter/ testdisk|7.1|Checks and undeletes partitions + PhotoRec, signature based recovery tool| blackarch-forensic |https://www.cgsecurity.org/index.html?testdisk.html testssl.sh|3.0.7|Testing TLS/SSL encryption| blackarch-crypto |https://github.com/drwetter/testssl.sh -tfsec|v0.63.1.r271.g85e55a9bf|Security scanner for your Terraform code.| blackarch-defensive |https://github.com/aquasecurity/tfsec +tfsec|v0.63.1.r287.g931567b60|Security scanner for your Terraform code.| blackarch-defensive |https://github.com/aquasecurity/tfsec tftp-bruteforce|0.1|A fast TFTP filename bruteforcer written in perl.| blackarch-cracker |http://www.hackingexposedcisco.com/ tftp-fuzz|1337|Master TFTP fuzzing script as part of the ftools series of fuzzers.| blackarch-fuzzer |http://nullsecurity.net/tools/fuzzer.html tftp-proxy|0.1|This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.| blackarch-proxy |http://www.c0decafe.de/ @@ -2435,7 +2435,7 @@ thcrut|1.2.5|Network discovery and OS Fingerprinting tool.| blackarch-fingerprin thedorkbox|7.43852d3|Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data.| blackarch-recon |https://github.com/cybersafeblr/thedorkbox thefatrat|813.b0586d0|TheFatRat a massive exploiting tool: easy tool to generate backdoor and easy tool to post exploitation attack.| blackarch-automation |https://github.com/Screetsec/TheFatRat thefuzz|160.b4c2c80|CLI fuzzing tool.| blackarch-fuzzer |https://github.com/droberson/thefuzz -theharvester|2814.f9b0cbc|Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).| blackarch-recon |http://www.edge-security.com/theHarvester.php +theharvester|2828.8b7dbc7|Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).| blackarch-recon |http://www.edge-security.com/theHarvester.php themole|0.3|Automatic SQL injection exploitation tool.| blackarch-webapp |http://sourceforge.net/projects/themole/ thezoo|216.4323c24|A project created to make the possibility of malware analysis open and available to the public.|blackarch-malware|https://github.com/ytisf/theZoo threatspec|0.5.0|Project to integrate threat modelling into development process.| blackarch-defensive |https://github.com/threatspec/threatspec @@ -2450,7 +2450,7 @@ tinfoleak2|41.c45c33e|The most complete open-source tool for Twitter intelligenc tinyproxy|1.11.1|A light-weight HTTP proxy daemon for POSIX operating systems| blackarch-proxy |https://tinyproxy.github.io/ tls-attacker|5759.973f490a3|A Java-based framework for analyzing TLS libraries.| blackarch-crypto |https://github.com/RUB-NDS/TLS-Attacker tls-fingerprinting|257.4b6e878|Tool and scripts to perform TLS Fingerprinting.| blackarch-fingerprint |https://github.com/LeeBrotherston/tls-fingerprinting -tls-map|v2.1.0.r7.g08bbd0b|CLI & library for TLS cipher suites manipulation.| blackarch-crypto |https://noraj.github.io/tls-map/ +tls-map|v2.1.0.r9.g52c4704|CLI & library for TLS cipher suites manipulation.| blackarch-crypto |https://noraj.github.io/tls-map/ tls-prober|286.72b1029|A tool to fingerprint SSL/TLS servers.| blackarch-fingerprint |https://github.com/WestpointLtd/tls_prober tlsenum|78.787c88b|A command line tool to enumerate TLS cipher-suites supported by a server.| blackarch-crypto |https://github.com/Ayrx/tlsenum tlsfuzzer|1382.0f7c53e|SSL and TLS protocol test suite and fuzzer.| blackarch-crypto |https://github.com/tomato42/tlsfuzzer @@ -2463,7 +2463,7 @@ tomcatwardeployer|93.fc3ac28|Apache Tomcat auto WAR deployment & pwning penetrat topera|19.3e230fd|An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.| blackarch-scanner |https://github.com/toperaproject/topera tor|0.4.7.7|Anonymizing overlay network.| blackarch-proxy |https://www.torproject.org/download/tor/ tor-autocircuit|0.2|Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.| blackarch-defensive |http://www.thesprawl.org/projects/tor-autocircuit/ -tor-browser-en|11.0.11|Tor Browser Bundle: anonymous browsing using Firefox and Tor.| blackarch-defensive |https://www.torproject.org/projects/torbrowser.html.en +tor-browser-en|11.0.13|Tor Browser Bundle: anonymous browsing using Firefox and Tor.| blackarch-defensive |https://www.torproject.org/projects/torbrowser.html.en tor-router|4.001a510|A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.| blackarch-defensive |https://github.com/Edu4rdSHL/tor-router torcrawl|81.3241834|Crawl and extract (regular or onion) webpages through TOR network.| blackarch-webapp |https://github.com/MikeMeliz/TorCrawl.py torctl|0.5.7|Script to redirect all traffic through tor network including dns queries for anonymizing entire system.| blackarch-automation |https://github.com/BlackArch/torctl @@ -2476,10 +2476,10 @@ traceroute|2.1.0|Tracks the route taken by packets over an IP network| blackarch trape|132.6baae24|People tracker on the Internet: OSINT analysis and research tool by Jose Pino.| blackarch-social |https://github.com/jofpin/trape traxss|81.48dee2e|Automated XSS Vulnerability Scanner.| blackarch-scanner |https://github.com/M4cs/traxss treasure|2.b3249be|Hunt for sensitive information through githubs code search.| blackarch-recon |https://github.com/GuerrillaWarfare/Treasure -trevorspray|108.a9d765b|A modular password sprayer with threading, clever proxying, loot modules, and more!| blackarch-cracker |https://github.com/blacklanternsecurity/TREVORspray +trevorspray|109.f128ffe|A modular password sprayer with threading, clever proxying, loot modules, and more!| blackarch-cracker |https://github.com/blacklanternsecurity/TREVORspray trid|2.24|An utility designed to identify file types from their binary signatures.| blackarch-forensic |http://mark0.net/soft-trid-e.html trinity|5181.3f8670b2|A Linux System call fuzzer.| blackarch-fuzzer |http://codemonkey.org.uk/projects/trinity/ -triton|3713.243026c9|A Dynamic Binary Analysis (DBA) framework.| blackarch-binary |https://github.com/JonathanSalwan/Triton +triton|3756.c82b6eb0|A Dynamic Binary Analysis (DBA) framework.| blackarch-binary |https://github.com/JonathanSalwan/Triton trivy|0.27.1|A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI| blackarch-scanner |https://github.com/aquasecurity/trivy trixd00r|0.0.1|An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.| blackarch-backdoor |http://nullsecurity.net/tools/backdoor.html truecrack|35|Password cracking for truecrypt(c) volumes.|blackarch-cracker|http://code.google.com/p/truecrack/ @@ -2565,7 +2565,7 @@ vault-scanner|299.0303cf4|Swiss army knife for hackers.| blackarch-scanner |http vba2graph|29.fcf96ef|Generate call graphs from VBA code, for easier analysis of malicious documents.| blackarch-malware |https://github.com/MalwareCantFly/Vba2Graph vbrute|1.11dda8b|Virtual hosts brute forcer.| blackarch-recon |https://github.com/nccgroup/vbrute vbscan|39.2b1ce48|A black box vBulletin vulnerability scanner written in perl.| blackarch-webapp |https://github.com/rezasp/vbscan -vbsmin|v1.1.0.r9.g062251a|VBScript minifier.| blackarch-packer |https://noraj.github.io/vbsmin/ +vbsmin|v1.1.0.r10.g1da3a5d|VBScript minifier.| blackarch-packer |https://noraj.github.io/vbsmin/ vcsmap|47.3889964|A plugin-based tool to scan public version control systems for sensitive information.| blackarch-scanner |https://github.com/melvinsh/vcsmap vega|1.0|An open source platform to test the security of web applications.| blackarch-webapp |https://github.com/subgraph/Vega/wiki veil|287.d4dd4ff|A tool designed to generate metasploit payloads that bypass common anti-virus solutions.| blackarch-automation |https://github.com/Veil-Framework/Veil @@ -2583,7 +2583,7 @@ viproy-voipkit|82.52b27db|VoIP Pen-Test Kit for Metasploit Framework.| blackarch virustotal|4.9aea023|Command-line utility to automatically lookup on VirusTotal all files recursively contained in a directory.| blackarch-malware |https://github.com/botherder/virustotal visql|49.3082e30|Scan SQL vulnerability on target site and sites of on server.| blackarch-scanner |https://github.com/blackvkng/viSQL visualize-logs|118.d2e370e|A Python library and command line tools to provide interactive log visualization.| blackarch-misc |https://github.com/keithjjones/visualize_logs -vivisect|1699.c1765319|A Python based static analysis and reverse engineering framework.| blackarch-debugger |http://visi.kenshoto.com/ +vivisect|1701.b8565c50|A Python based static analysis and reverse engineering framework.| blackarch-debugger |http://visi.kenshoto.com/ vlan-hopping|21.a37ba4e|Easy 802.1Q VLAN Hopping| blackarch-automation |https://github.com/nccgroup/vlan-hopping vlany|255.9ef014a|Linux LD_PRELOAD rootkit (x86 and x86_64 architectures).| blackarch-backdoor |https://github.com/mempodippy/vlany vmap|0.3|A Vulnerability-Exploit desktop finder.| blackarch-exploitation |https://github.com/git-rep/vmap @@ -2616,7 +2616,7 @@ wafpass|48.c3ea1b9|Analysing parameters with all payloads' bypass methods, aimin wafw00f|833.61cee00|Identify and fingerprint Web Application Firewall (WAF) products protecting a website.| blackarch-scanner |https://github.com/EnableSecurity/wafw00f waidps|16.ff8d270|Wireless Auditing, Intrusion Detection & Prevention System.| blackarch-wireless |https://github.com/SYWorks/waidps waldo|29.ee4f960|A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.| blackarch-recon |https://github.com/red-team-labs/waldo -wapiti|3.1.1.r11.gabd7700|A vulnerability scanner for web applications.| blackarch-webapp |https://github.com/wapiti-scanner/wapiti +wapiti|3.1.2.r8.gf35411e|A vulnerability scanner for web applications.| blackarch-webapp |https://github.com/wapiti-scanner/wapiti wascan|37.6926338|Web Application Scanner.| blackarch-webapp |https://github.com/m4ll0k/WAScan wavemon|0.9.4|Ncurses-based monitoring application for wireless network devices| blackarch-wireless |https://github.com/uoaerg/wavemon waybackpack|69.5f0a074|Download the entire Wayback Machine archive for a given URL.| blackarch-webapp |https://github.com/jsvine/waybackpack @@ -2642,7 +2642,7 @@ websearch|3.09935a5|Search vhost names given a host range. Powered by Bing..| bl webshag|1.10|A multi-threaded, multi-platform web server audit tool.| blackarch-fuzzer |http://www.scrt.ch/en/attack/downloads/webshag webshells|42.f117dca|Web Backdoors.| blackarch-webapp |https://github.com/BlackArch/webshells webslayer|5|A tool designed for brute forcing Web Applications.| blackarch-webapp |https://code.google.com/p/webslayer/ -websockify|896.4b19463|WebSocket to TCP proxy/bridge.| blackarch-networking |http://github.com/kanaka/websockify +websockify|898.33910d7|WebSocket to TCP proxy/bridge.| blackarch-networking |http://github.com/kanaka/websockify webspa|0.8|A web knocking tool, sending a single HTTP/S to run O/S commands.| blackarch-backdoor |http://sourceforge.net/projects/webspa/ websploit|4.0.4|An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks| blackarch-exploitation |https://github.com/websploit/websploit webtech|1.3.1|Identify technologies used on websites.| blackarch-webapp |https://pypi.org/project/webtech/#files @@ -2652,12 +2652,12 @@ weeman|91.53c2efa|HTTP Server for phishing in python.| blackarch-social |https:/ weevely|882.2155d8e|Weaponized web shell.| blackarch-webapp |http://epinna.github.io/Weevely/ weirdaal|331.c14e36d|AWS Attack Library.| blackarch-webapp |https://github.com/carnal0wnage/weirdAAL wepbuster|1.0_beta_0.7|script for automating aircrack-ng| blackarch-wireless |http://code.google.com/p/wepbuster/ -wesng|233.5c241fa|Windows Exploit Suggester - Next Generation.| blackarch-exploitation |https://github.com/bitsadmin/wesng +wesng|235.3fca87d|Windows Exploit Suggester - Next Generation.| blackarch-exploitation |https://github.com/bitsadmin/wesng wfuzz|1155.1b695ee|Utility to bruteforce web applications to find their not linked resources.| blackarch-fuzzer |https://github.com/xmendez/wfuzz -whapa|346.5613389|WhatsApp Parser Tool.| blackarch-misc |https://github.com/B16f00t/whapa +whapa|354.605fd25|WhatsApp Parser Tool.| blackarch-misc |https://github.com/B16f00t/whapa whatbreach|42.dad6b9f|OSINT tool to find breached emails and databases.| blackarch-social |https://github.com/ekultek/whatbreach whatportis|54.59a1718|A command to search port names and numbers.| blackarch-misc |https://github.com/ncrocfer/whatportis -whatsmyname|990.25c4e35|Tool to perform user and username enumeration on various websites.| blackarch-social |https://github.com/WebBreacher/WhatsMyName +whatsmyname|994.0c8cb4e|Tool to perform user and username enumeration on various websites.| blackarch-social |https://github.com/WebBreacher/WhatsMyName whatwaf|392.b14e866|Detect and bypass web application firewalls and protection systems.| blackarch-webapp |https://github.com/Ekultek/WhatWaf whatweb|4910.efee4d80|Next generation web scanner that identifies what websites are running.| blackarch-recon |http://www.morningstarsecurity.com/research/whatweb whichcdn|22.5fc6ddd|Tool to detect if a given website is protected by a Content Delivery Network.| blackarch-webapp |https://github.com/Nitr4x/whichCDN @@ -2689,7 +2689,7 @@ windowsspyblocker|4.38.0|Block spying and tracking on Windows.| blackarch-window winexe|1.00|Remotely execute commands on Windows NT/2000/XP/2003 systems.| blackarch-misc |http://sourceforge.net/projects/winexe/ winfo|2.0|Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.| blackarch-windows |http://www.ntsecurity.nu/toolbox/winfo/ winhex|20.4|Hex Editor and Disk Editor.| blackarch-windows |https://www.x-ways.net/winhex/ -winpwn|381.fdceb1d|Automation for internal Windows Penetrationtest / AD-Security.| blackarch-windows |https://github.com/S3cur3Th1sSh1t/WinPwn +winpwn|382.e1bba36|Automation for internal Windows Penetrationtest / AD-Security.| blackarch-windows |https://github.com/S3cur3Th1sSh1t/WinPwn winregfs|150.c6da413|Windows Registry FUSE filesystem.| blackarch-misc |https://github.com/jbruchon/winregfs winrelay|2.0|A TCP/UDP forwarder/redirector that works with both IPv4 and IPv6.| blackarch-windows |http://ntsecurity.nu/toolbox/winrelay/ wireless-ids|24.b132071|Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.| blackarch-wireless |https://github.com/SYWorks/wireless-ids @@ -2734,7 +2734,7 @@ wxhexeditor|722.c22ce20|A free hex editor / disk editor for Linux, Windows and M wyd|0.2|Gets keywords from personal files. IT security/forensic tool.| blackarch-cracker |http://www.remote-exploit.org/?page_id=418 x-rsa|165.ec75d15|Contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem.| blackarch-crypto |https://github.com/X-Vector/X-RSA x-scan|3.3|A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.| blackarch-windows |http://www.xfocus.org/ -x64dbg|2022.05.18|An open-source x64/x32 debugger for windows.| blackarch-windows |https://github.com/x64dbg/x64dbg/releases +x64dbg|2022.05.25|An open-source x64/x32 debugger for windows.| blackarch-windows |https://github.com/x64dbg/x64dbg/releases x8|113.5f3b3cd|Hidden parameters discovery suite.| blackarch-webapp |https://github.com/Sh1Yo/x8 xcat|266.faaf8fe|A command line tool to automate the exploitation of blind XPath injection vulnerabilities.| blackarch-exploitation |https://github.com/orf/xcat xcavator|5.bd9e2d8|Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.| blackarch-sniffer |https://github.com/nccgroup/xcavator @@ -2769,7 +2769,7 @@ xssya|13.cd62817|A Cross Site Scripting Scanner & Vulnerability Confirmation.| b xwaf|162.c6f6bb7|Automatic WAF bypass tool.| blackarch-webapp |https://github.com/3xp10it/bypass_waf xxeinjector|55.604c39a|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.| blackarch-exploitation |https://github.com/enjoiz/XXEinjector xxeserv|12.046c559|A mini webserver with FTP support for XXE payloads.| blackarch-networking |https://github.com/staaldraad/xxeserv -xxexploiter|101.c0c54d2|It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration.| blackarch-exploitation |https://github.com/luisfontes19/xxexploiter +xxexploiter|103.c1f0f41|It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration.| blackarch-exploitation |https://github.com/luisfontes19/xxexploiter xxxpwn|10.27a2d27|A tool Designed for blind optimized XPath 1 injection attacks.| blackarch-webapp |https://github.com/feakk/xxxpwn xxxpwn-smart|6.b11b95b|A fork of xxxpwn adding further optimizations and tweaks.| blackarch-webapp |https://github.com/aayla-secura/xxxpwn_smart yaaf|7.4d6273a|Yet Another Admin Finder.| blackarch-webapp |https://github.com/Plasticoo/YAAF @@ -2791,7 +2791,7 @@ zaproxy|2.11.1|Integrated penetration testing tool for finding vulnerabilities i zarp|0.1.8|A network attack tool centered around the exploitation of local networks.| blackarch-exploitation |https://defense.ballastsecurity.net/wiki/index.php/Zarp zdns|249.bfbfae2|Fast CLI DNS Lookup Tool.| blackarch-networking |https://github.com/zmap/zdns zeek|13053.0c2f04548|A powerful network analysis framework that is much different from the typical IDS you may know.| blackarch-networking |https://github.com/zeek/zeek -zeek-aux|518.e76e84e|Handy auxiliary programs related to the use of the Zeek Network Security Monitor.| blackarch-networking |https://github.com/zeek/zeek-aux +zeek-aux|523.25fc68a|Handy auxiliary programs related to the use of the Zeek Network Security Monitor.| blackarch-networking |https://github.com/zeek/zeek-aux zelos|270.0c5bd57|A comprehensive binary emulation and instrumentation platform.| blackarch-binary |https://github.com/zeropointdynamics/zelos zeratool|42.a541336|Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems.| blackarch-exploitation |https://github.com/ChrisTheCoolHut/Zeratool zerowine|0.0.2|Malware Analysis Tool - research project to dynamically analyze the behavior of malware| blackarch-malware |http://zerowine.sf.net/ diff --git a/data/webapp b/data/webapp index 14fcbdb9..fb4b5578 100644 --- a/data/webapp +++ b/data/webapp @@ -4,7 +4,7 @@ adfind|31.9808cb7|Simple admin panel finder for php,js,cgi,asp and aspx admin pa adminpagefinder|0.1|This python script looks for a large amount of possible administrative interfaces on a given site.|http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html albatar|34.4e63f22|A SQLi exploitation framework in Python.|https://github.com/lanjelot/albatar anti-xss|166.2725dc9|A XSS vulnerability scanner.|https://github.com/lewangbtcc/anti-XSS -arachni|1.6.1|A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.|https://www.arachni-scanner.com +arachni|1.6.1.3|A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.|https://www.arachni-scanner.com arjun|201.01c755d|HTTP parameter discovery suite.|https://github.com/s0md3v/Arjun astra|486.394d538|Automated Security Testing For REST API's.|https://github.com/flipkart-incubator/astra atlas|7.77bd6c8|Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS.|https://github.com/m4ll0k/Atlas @@ -19,7 +19,7 @@ bsqlbf|2.7|Blind SQL Injection Brute Forcer.|http://code.google.com/p/bsqlbf-v2/ bsqlinjector|13.027184f|Blind SQL injection exploitation tool written in ruby.|https://github.com/enjoiz/BSQLinjector burpsuite|2022.3.8|An integrated platform for attacking web applications (community edition) + SHELLING plugin.|https://portswigger.net/burp/releases c5scan|30.be8845c|Vulnerability scanner and information gatherer for the Concrete5 CMS.|https://github.com/auraltension/c5scan -cansina|56.56d14a5|A python-based Web Content Discovery Tool.|https://github.com/deibit/cansina +cansina|57.e0d9727|A python-based Web Content Discovery Tool.|https://github.com/deibit/cansina chankro|21.7b6e844|Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (p.e. reverse shell) bypassing disable_functions & open_basedir).|https://github.com/TarlogicSecurity/Chankro cjexploiter|6.72b08d8|Drag and Drop ClickJacking exploit development assistance tool.|https://github.com/enddo/CJExploiter cloudget|64.cba10b1|Python script to bypass cloudflare from command line. Built upon cfscrape module.|https://github.com/eudemonics/cloudget @@ -29,15 +29,15 @@ cmsfuzz|5.6be5a98|Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke cmsscan|43.f060b4b|CMS scanner to identify and find vulnerabilities for Wordpress, Drupal, Joomla, vBulletin.|https://github.com/ajinabraham/CMSScan cmsscanner|0.13.8|CMS Scanner Framework.|https://github.com/wpscanteam/CMSScanner comission|203.67b890e|WhiteBox CMS analysis.|https://github.com/Intrinsec/comission -commix|1814.916770a0|Automated All-in-One OS Command Injection and Exploitation Tool.|https://github.com/commixproject/commix +commix|1821.7d0c36dc|Automated All-in-One OS Command Injection and Exploitation Tool.|https://github.com/commixproject/commix corscanner|99.593043f|Fast CORS misconfiguration vulnerabilities scanner.|https://github.com/chenjj/CORScanner corsy|69.2985ae2|CORS Misconfiguration Scanner.|https://github.com/s0md3v/Corsy crabstick|47.bb7827f|Automatic remote/local file inclusion vulnerability analysis and exploit tool.|https://github.com/Hack-Hut/CrabStick crawlic|51.739fe2b|Web recon tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server).|https://github.com/Ganapati/Crawlic -crlfuzz|59.0f8ca90|A fast tool to scan CRLF vulnerability written in Go.|https://github.com/dwisiswant0/crlfuzz +crlfuzz|60.da5d40c|A fast tool to scan CRLF vulnerability written in Go.|https://github.com/dwisiswant0/crlfuzz csrftester|1.0|The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.|http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project cybercrowl|111.f7cac52|A Python Web path scanner tool.|https://github.com/chamli/CyberCrowl -dalfox|1124.4b22de7|Parameter Analysis and XSS Scanning tool.|https://github.com/hahwul/dalfox +dalfox|1128.0393e8d|Parameter Analysis and XSS Scanning tool.|https://github.com/hahwul/dalfox darkdump|17.06ca0b6|Search The Deep Web Straight From Your Terminal.|https://github.com/josh0xA/darkdump darkjumper|5.8|This tool will try to find every website that host at the same server at your target.|http://sourceforge.net/projects/darkjumper/ darkscrape|68.2ca0e37|OSINT Tool For Scraping Dark Websites.|https://github.com/itsmehacker/DarkScrape @@ -48,7 +48,7 @@ dirble|1.4.2|Fast directory scanning and scraping tool.|https://github.com/nccgr dirbuster-ng|9.0c34920|C CLI implementation of the Java dirbuster tool.|https://github.com/digination/dirbuster-ng dirhunt|298.57bfd58|Find web directories without bruteforce.|https://github.com/hahwul/dirhunt dirscraper|16.e752450|OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website.|https://github.com/Cillian-Collins/dirscraper -dirsearch|2105.6494e9f|HTTP(S) directory/file brute forcer.|https://github.com/maurosoria/dirsearch +dirsearch|2115.db98bbe|HTTP(S) directory/file brute forcer.|https://github.com/maurosoria/dirsearch docem|20.b0ddd87|Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids).|https://github.com/whitel1st/docem domi-owned|41.583d0a5|A tool used for compromising IBM/Lotus Domino servers.|https://github.com/coldfusion39/domi-owned dontgo403|0.3.r9.gf948e31|Tool to bypass 40X response codes..|https://github.com/devploit/dontgo403 @@ -94,7 +94,7 @@ graphql-path-enum|14.aed4346|Tool that lists the different ways of reaching a gi graphqlmap|51.98997bd|Scripting engine to interact with a graphql endpoint for pentesting purposes.|https://github.com/swisskyrepo/GraphQLmap h2csmuggler|7.7ea573a|HTTP Request Smuggling over HTTP/2 Cleartext (h2c).|https://github.com/BishopFox/h2csmuggler h2t|36.9183a30|Scans a website and suggests security headers to apply.|https://github.com/gildasio/h2t -hakrawler|214.d3c2b50|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application.|https://github.com/hakluke/hakrawler +hakrawler|216.6190559|Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application.|https://github.com/hakluke/hakrawler hetty|134.f60202e|HTTP toolkit for security research. Aims to become an open source alternative to commercial software like Burp Suite Pro.|https://github.com/dstotijn/hetty hookshot|196.7aadacc|Integrated web scraper and email account data breach comparison tool.|https://github.com/andrew-vii/hookshot/ htcap|155.a59c592|A web application analysis tool for detecting communications between javascript and the server.|https://github.com/segment-srl/htcap @@ -125,7 +125,7 @@ jsparser|31.ccd3ab6|Parse javascript using Tornado and JSBeautifier to discover jsql-injection|0.85|A Java application for automatic SQL database injection.|https://github.com/ron190/jsql-injection jstillery|65.512e9af|Advanced JavaScript Deobfuscation via Partial Evaluation.|https://github.com/mindedsecurity/JStillery juumla|80.3e1b594|Python tool created to identify Joomla version, scan for vulnerabilities and search for config files.|https://github.com/oppsec/juumla -jwt-hack|v1.1.2.r1.g335a7e8|A tool for hacking / security testing to JWT.|https://github.com/hahwul/jwt-hack +jwt-hack|v1.1.2.r2.gcea10a3|A tool for hacking / security testing to JWT.|https://github.com/hahwul/jwt-hack kadimus|113.b036a7f|LFI Scan & Exploit Tool.|https://github.com/P0cL4bs/Kadimus kiterunner|19.7d5824c|Contextual Content Discovery Tool.|https://github.com/assetnote/kiterunner kolkata|3.0|A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.|http://www.blackhatlibrary.net/Kolkata @@ -136,7 +136,7 @@ lfi-fuzzploit|1.1|A simple tool to help in the fuzzing for, finding, and exploit lfi-image-helper|0.8|A simple script to infect images with PHP Backdoors for local file inclusion attacks.|http://packetstormsecurity.com/files/129871/LFI-Image-Helper.8.html lfi-sploiter|1.0|This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.|http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html lfifreak|21.0c6adef|A unique automated LFi Exploiter with Bind/Reverse Shells.|https://github.com/OsandaMalith/LFiFreak/ -lfimap|115.bceb90c|Local file inclusion discovery and exploitation tool.|https://github.com/hansmach1ne/lfimap +lfimap|118.7f47578|Local file inclusion discovery and exploitation tool.|https://github.com/hansmach1ne/lfimap liffy|31.5866f73|A Local File Inclusion Exploitation tool.|https://github.com/mzfr/liffy/ lightbulb|88.9e8d6f3|Python framework for auditing web applications firewalls.|https://github.com/lightbulb-framework/lightbulb-framework linkfinder|162.095bb62|Discovers endpoint and their parameters in JavaScript files.|https://github.com/GerbenJavado/LinkFinder @@ -171,24 +171,24 @@ peepingtom|56.bc6f4d8|A tool to take screenshots of websites. Much like eyewitne photon|325.6a41a90|Incredibly fast crawler which extracts urls, emails, files, website accounts and much more.|https://github.com/s0md3v/Photon php-findsock-shell|2.b8a984f|A Findsock Shell implementation in PHP + C.|https://github.com/pentestmonkey/php-findsock-shell php-malware-finder|0.3.4.r74.g48936ef|Detect potentially malicious PHP files.|https://github.com/jvoisin/php-malware-finder -phpggc|382.80fc022|A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.|https://github.com/ambionics/phpggc -phpsploit|972.ee83c32|Stealth post-exploitation framework.|https://github.com/nil0x42/phpsploit -pixload|74.d6b87f5|Image Payload Creating/Injecting tools.|https://github.com/chinarulezzz/pixload +phpggc|389.5589874|A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.|https://github.com/ambionics/phpggc +phpsploit|979.7dabcad|Stealth post-exploitation framework.|https://github.com/nil0x42/phpsploit +pixload|77.d9645fb|Image Payload Creating/Injecting tools.|https://github.com/chinarulezzz/pixload plecost|102.ef0d89b|Wordpress finger printer Tool.|https://github.com/iniqua/plecost plown|13.ccf998c|A security scanner for Plone CMS.|https://github.com/unweb/plown poly|52.4e6f189|Polymorphic webshells.|https://github.com/grCod/poly pown|162.1036e02|Security testing and exploitation toolkit built on top of Node.js and NPM.|https://github.com/pownjs/pown ppfuzz|24.0c3c526|A fast tool to scan client-side prototype pollution vulnerability written in Rust.|https://github.com/dwisiswant0/ppfuzz -ppmap|v1.2.0.r13.gb27c3a3|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|https://github.com/kleiton0x00/ppmap +ppmap|v1.2.0.r14.g42011bd|A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.|https://github.com/kleiton0x00/ppmap proxenet|712.67fc6b5|THE REAL hacker friendly proxy for web application pentests.|https://github.com/hugsy/proxenet pwndrop|18.385ba70|Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.|https://github.com/kgretzky/pwndrop pyfiscan|2872.11780ef|Free web-application vulnerability and version scanner.|https://github.com/fgeek/pyfiscan python-witnessme|1.5.0|Web Inventory tool, takes screenshots of webpages using Pyppeteer.|https://pypi.org/project/witnessme/#files python2-jsbeautifier|1.13.4|JavaScript unobfuscator and beautifier.|https://github.com/beautify-web/js-beautify -rabid|v0.1.0.r10.g98209bc|A CLI tool and library allowing to simply decode all kind of BigIP cookies|https://noraj.github.io/rabid/ +rabid|v0.1.0.r12.g1d71ea2|A CLI tool and library allowing to simply decode all kind of BigIP cookies|https://noraj.github.io/rabid/ rapidscan|208.1441c05|The Multi-Tool Web Vulnerability Scanner.|https://github.com/skavngr/rapidscan remot3d|38.a707ef7|An Simple Exploit for PHP Language.|https://github.com/KeepWannabe/Remot3d -restler-fuzzer|v8.5.0.r15.g2ee8783|First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.|https://github.com/microsoft/restler-fuzzer +restler-fuzzer|v8.5.0.r16.g1bd7bc6|First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.|https://github.com/microsoft/restler-fuzzer riwifshell|38.40075d5|Web backdoor - infector - explorer.|https://github.com/graniet/riwifshell ruler|301.1e5ee2d|A tool to abuse Exchange services.|https://github.com/sensepost/ruler rustbuster|302.4a243d4|DirBuster for Rust.|https://github.com/phra/rustbuster @@ -246,7 +246,7 @@ w13scan|421.d4ca24f|Passive Security Scanner.|https://github.com/boy-hack/w13sca wafninja|25.379cd98|A tool which contains two functions to attack Web Application Firewalls.|https://github.com/khalilbijjou/WAFNinja wafp|0.01_26c3|An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.|http://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html wafpass|48.c3ea1b9|Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.|https://github.com/wafpassproject/wafpass -wapiti|3.1.1.r11.gabd7700|A vulnerability scanner for web applications.|https://github.com/wapiti-scanner/wapiti +wapiti|3.1.2.r8.gf35411e|A vulnerability scanner for web applications.|https://github.com/wapiti-scanner/wapiti wascan|37.6926338|Web Application Scanner.|https://github.com/m4ll0k/WAScan waybackpack|69.5f0a074|Download the entire Wayback Machine archive for a given URL.|https://github.com/jsvine/waybackpack wcvs|1.1.0.r0.ga9ae886|Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning.|https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner diff --git a/data/windows b/data/windows index d72fb607..e9343263 100644 --- a/data/windows +++ b/data/windows @@ -26,7 +26,7 @@ filefuzz|1.0|A binary file fuzzer for Windows with several options.|http://www.f fport|2.0|Identify unknown open ports and their associated applications.|http://www.foundstone.com/us/resources/proddesc/fport.htm fred|0.1.1|Cross-platform M$ registry hive editor.|https://www.pinguin.lu/fred fuzztalk|1.0.0.0|An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.|https://code.google.com/p/fuzztalk -gene|76.150d6e5|Signature Engine for Windows Event Logs.|https://github.com/0xrawsec/gene +gene|77.dca7ce6|Signature Engine for Windows Event Logs.|https://github.com/0xrawsec/gene gplist|1.0|Lists information about the applied Group Policies.|http://ntsecurity.nu/toolbox/gplist/ grabitall|1.1|Performs traffic redirection by sending spoofed ARP replies.|http://ntsecurity.nu/toolbox/grabitall/ gsd|1.1|Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option.|http://ntsecurity.nu/toolbox/gsd/ @@ -122,9 +122,9 @@ windows-privesc-check|181.9f304fd|Standalone Executable to Check for Simple Priv windowsspyblocker|4.38.0|Block spying and tracking on Windows.|https://github.com/crazy-max/WindowsSpyBlocker/ winfo|2.0|Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.|http://www.ntsecurity.nu/toolbox/winfo/ winhex|20.4|Hex Editor and Disk Editor.|https://www.x-ways.net/winhex/ -winpwn|381.fdceb1d|Automation for internal Windows Penetrationtest / AD-Security.|https://github.com/S3cur3Th1sSh1t/WinPwn +winpwn|382.e1bba36|Automation for internal Windows Penetrationtest / AD-Security.|https://github.com/S3cur3Th1sSh1t/WinPwn winrelay|2.0|A TCP/UDP forwarder/redirector that works with both IPv4 and IPv6.|http://ntsecurity.nu/toolbox/winrelay/ wpsweep|1.0|A simple ping sweeper, that is, it pings a range of IP addresses and lists the ones that reply.|http://ntsecurity.nu/toolbox/wpsweep/ wups|1.4|An UDP port scanner for Windows.|http://ntsecurity.nu/toolbox/wups/ x-scan|3.3|A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.|http://www.xfocus.org/ -x64dbg|2022.05.18|An open-source x64/x32 debugger for windows.|https://github.com/x64dbg/x64dbg/releases +x64dbg|2022.05.25|An open-source x64/x32 debugger for windows.|https://github.com/x64dbg/x64dbg/releases