Lightweight Debian Based Pen Testing Linux Distro
Web-based application to execute shell commands.
ROuter MAN HUNTER detects wireless attackers and captures their MAC
Sending encrypted data through internet web applications.
One-time Pad Encryption
Automatic SQL Injection Exploitation Tool
PIN Knock Auth for Web Projects
Active-probing-based network IDS for wireless networks
Break The Security Linux is a Penetration testing OS based on Ubuntu
Forensic scripts for evidence acquisitions, analysis and more
Software de controle deBraço Robotico em Linux
Simple application to encrypt and decrypt strings
An open source malware analysis tool
OCD-01 [OSSEC Cool Dashboard]
A Java application for transferring computer files in 5 letter groups
Extracts multiple proxies from a list of websites
Enumeration and automation of file discovery for your sec tools.
Trusted Computing Platform Management Tool
BWST is a short word for Brute-force Word-list Segmentation Technique.
A free Password Generator written in Java
Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.
A protocol agnostic application layer denial of service attack.
Lightweight Linux distro for penetration testing