0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/

3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/

3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/

42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d

acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/

ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html

admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html

adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site. http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html

admsnmp 0.1 ADM SNMP audit scanner.

aesfix 1.0.1 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/

aeskeyfind 1.0 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/

aespipe 2.4c Reads data from stdin and outputs encrypted or decrypted results to stdout. http://loop-aes.sourceforge.net/aespipe/

afflib 3.7.1 An extensible open format for the storage of disk images and related forensic information http://www.afflib.org

afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP) http://alexthepuffin.googlepages.com/

against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. http://nullsecurity.net/tools/cracker.html

aiengine 315.7d1c555 A packet inspection engine with capabilities of learning without any human intervention. https://bitbucket.org/camp0/aiengine/

aimage 3.2.5 A program to create aff-images. http://www.afflib.org

air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/

airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html

airgraph-ng 2371 Graphing tool for the aircrack suite http://www.aircrack-ng.org

airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. http://midnightresearch.com/projects/wicrawl/

airpwn 1.4 A tool for generic packet injection on an 802.11 network. http://airpwn.sourceforge.net

allthevhosts 1.0 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/

androguard 1.9 Reverse engineering, Malware and goodware analysis of Android applications and more. https://code.google.com/p/androguard/

android-apktool 1.5.2 A tool for reengineering Android apk files. http://forum.xda-developers.com/showthread.php?t=1755243

android-ndk r9c Android C/C++ developer kit. http://developer.android.com/sdk/ndk/index.html

android-sdk-platform-tools r19 Platform-Tools for Google Android SDK (adb and fastboot) http://developer.android.com/sdk/index.html

android-sdk r22.3 Google Android SDK http://developer.android.com/sdk/index.html

android-udev-rules 8181.da07974 Android udev rules. https://github.com/bbqlinux/android-udev-rules

androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html

anontwi 1.0 A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com. http://anontwi.sourceforge.net/

aphopper 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks. http://aphopper.sourceforge.net/

apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. http://www.c0decafe.de/

arachni 1.0.2 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. https://www.arachni-scanner.com

arduino 1.0.5 Arduino SDK (includes patched avrdude and librxtx) http://arduino.cc/en/Main/Software

argus 3.0.6.1 Network monitoring tool with flow control. http://qosient.com/argus/

argus-clients 3.0.6.2 Network monitoring client for Argus. http://qosient.com/argus/

armitage 140715 A graphical cyber attack management tool for Metasploit. http://www.fastandeasyhacking.com/

arp-scan 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network http://www.nta-monitor.com/tools/arp-scan/

arpalert 2.0.12 Monitor ARP changes in ethernet networks http://www.arpalert.org/

arpantispoofer 1.0.1.32 A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP. http://arpantispoofer.sourceforge.net/

arpoison 0.6 The UNIX arp cache update utility http://www.arpoison.net

arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. http://arpon.sourceforge.net/

arpwner 26.f300fdf GUI-based python tool for arp posioning and dns poisoning attacks. https://github.com/ntrippar/ARPwner

artillery 1.0.2 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system https://www.trustedsec.com/downloads/artillery/

asleap 2.2 Actively recover LEAP/PPTP passwords. http://www.willhackforsushi.com/Asleap.html

asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. http://seclists.org/basics/2006/Sep/128

athena-ssl-scanner 0.5.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html

atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html

auto-xor-decryptor 3.6a1f8f7 Automatic XOR decryptor tool. http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/

autopsy 2.24 A GUI for The Sleuth Kit. http://www.sleuthkit.org/autopsy

azazel 10.401e3aa A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. https://github.com/chokepoint/azazel

b2sum 20140114 BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file. https://blake2.net/

backcookie 34.66b0a27 Small backdoor using cookie. https://github.com/mrjopino/backcookie

backdoor-factory 91.20fe713 Patch win32/64 binaries with shellcode. https://github.com/secretsquirrel/the-backdoor-factory

backfuzz 36.8e54ed6 A network protocol fuzzing toolkit. https://github.com/localh0t/backfuzz

balbuzard 65.546c5dcf629c A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). https://bitbucket.org/decalage/balbuzard/

bamf-framework 35.30d2b4b A modular framework designed to be a platform to launch attacks against botnets. https://github.com/bwall/BAMF

basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names. http://www.morningstarsecurity.com/research

batman-adv 2013.4.0 batman kernel module, (included upstream since .38) http://www.open-mesh.net/

bbqsql 1.2 SQL injection exploitation tool. https://github.com/neohapsis/bbqsql

bdfproxy 37.7b6221b Patch Binaries via MITM: BackdoorFactory + mitmProxy https://github.com/secretsquirrel/BDFProxy

bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities. http://www.aldeid.com/wiki/Bed

beef 0.4.5.0.118.g9e43f0b The Browser Exploitation Framework that focuses on the web browser http://beefproject.com/

beholder 0.8.9 A wireless intrusion detection tool that looks for anomalies in a wifi environment. http://www.beholderwireless.org/

beleth 36.0963699 A Multi-threaded Dictionary based SSH cracker. https://github.com/chokepoint/Beleth

bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows http://sourceforge.net/projects/bfbtester/

bgp-md5crack 0.1 RFC2385 password cracker http://www.c0decafe.de/

bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address. http://www.morningstarsecurity.com/research/bing-ip2hosts

bing-lfi-rfi 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities. http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html

binwalk 2.0.1 A tool for searching a given binary image for embedded files. http://binwalk.org

binwally 3.ca092a7 Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep). https://github.com/bmaia/binwally

bios_memimage 1.2 A tool to dump RAM contents to disk (aka cold boot attack). http://citp.princeton.edu/memory/code/

birp 60.1d7c49f A tool that will assist in the security assessment of mainframe applications served over TN3270. https://github.com/sensepost/birp

bittwist 2.0 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic. http://bittwist.sourceforge.net/

bkhive 1.1.1 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive. http://sourceforge.net/projects/ophcrack

blackarch-menus 0.2 BlackArch specific XDG-compliant menu http://www.blackarch.org/

blackhash 0.2 Creates a filter from system hashes http://16s.us/blackhash/

bletchley 0.0.1 A collection of practical application cryptanalysis tools. https://code.google.com/p/bletchley/

blindelephant 7 A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations http://blindelephant.sourceforge.net/

blindsql 1.0 Set of bash scripts for blind SQL injection attacks http://www.enye-sec.org/programas.html

bluebox-ng 65.33a19a8 A GPL VoIP/UC vulnerability scanner. https://github.com/jesusprubio/bluebox-ng

bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt. http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html

bluelog 1.1.1 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode. http://www.digifail.com/software/bluelog.shtml

bluepot 0.1 A Bluetooth Honeypot written in Java, it runs on Linux https://code.google.com/p/bluepot/

blueprint 0.1_3 A perl tool to identify Bluetooth devices. http://trifinite.org/trifinite_stuff_blueprinting.html

blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios. http://www.hackfromacave.com/projects/blueranger.html

bluesnarfer 0.1 A bluetooth attacking tool http://www.alighieri.org/project.html

bmap-tools 3.2 Tool for copying largely sparse files using information from a block map file. http://git.infradead.org/users/dedekind/bmap-tools.git

bob-the-butcher 0.7.1 A distributed password cracker package. http://btb.banquise.net/

bokken-hg 370.b180f39d107f GUI for radare2 and pyew. http://inguma.eu/projects/bokken/

bowcaster 0.1 This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures. https://github.com/zcutlip/bowcaster

braa 0.82 A mass snmp scanner http://s-tech.elsat.net.pl/braa/

braces 0.4 A Bluetooth Tracking Utility. http://braces.shmoo.com/

browser-fuzzer 3 Browser Fuzzer 3 http://www.krakowlabs.com/dev.html

brutessh 0.5 A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads. http://www.edge-security.com/edge-soft.php

brutus 2 One of the fastest, most flexible remote password crackers you can get your hands on. http://www.hoobie.net/brutus/

bsdiff 4.3 bsdiff and bspatch are tools for building and applying patches to binary files. http://www.daemonology.net/bsdiff/

bsqlbf 2.6 Blind SQL Injection Brute Forcer. http://code.google.com/p/bsqlbf-v2/

bss 0.8 Bluetooth stack smasher / fuzzer http://www.secuobs.com/news/15022006-bss_0_8.shtml

bt_audit 0.1.1 Bluetooth audit http://www.betaversion.net/btdsd/download/

btcrack 1.1 The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. http://www.nruns.com/_en/security_tools_btcrack.php

btscanner 2.1 Bluetooth device scanner. http://www.pentest.co.uk

bulk-extractor 1.3.1 Bulk Email and URL extraction tool https://github.com/simsong/bulk_extractor

bully 23.1fef73a A wifi-protected-setup (WPS) brute force attack tool. http://code.google.com/p/bully/

bunny 0.93 A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. http://code.google.com/p/bunny-the-fuzzer/

burpsuite 1.6 An integrated platform for attacking web applications (free edition). http://portswigger.net/burp/

buttinsky 138.1a2a1b2 Provide an open source framework for automated botnet monitoring. https://github.com/buttinsky/buttinsky

bvi 1.4.0beta A display-oriented editor for binary files operate like "vi" editor. http://bvi.sourceforge.net/

cadaver 0.23.3 Command-line WebDAV client for Unix http://www.webdav.org/cadaver

canari 1.1 A transform framework for maltego http://www.canariproject.com/

cansina 93.abc6577 A python-based Web Content Discovery Tool. https://github.com/deibit/cansina

capstone 2.1.2 A lightweight multi-platform, multi-architecture disassembly framework. http://www.capstone-engine.org/index.html

carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. http://trifinite.org/trifinite_stuff_carwhisperer.html

casefile 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information http://www.paterva.com/web6/products/casefile.php

cdpsnarf 0.1.6 Cisco discovery protocol sniffer. https://github.com/Zapotek/cdpsnarf

cecster 5.15544cb A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols https://github.com/nccgroup/CECster

centry 72.6de2868 Cold boot & DMA protection https://github.com/0xPoly/Centry

cewl 4.3 A custom word list generator http://www.digininja.org/projects/cewl.php

cflow 1.4 A C program flow analyzer. http://www.gnu.org/software/cflow/

chaosmap 1.3 An information gathering tool and dns / whois / web server scanner http://freecode.com/projects/chaosmap

chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. http://chaosreader.sourceforge.net/

chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes. https://github.com/moxie0/chapcrack

check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker. http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html

checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN). http://kernel.embedromix.ro/us/

checkpwd 1.23 Oracle Password Checker (Cracker) http://www.red-database-security.com/software/checkpwd.html

checksec 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used. http://www.trapkit.de/tools/checksec.html

chiron 0.1 An all-in-one IPv6 Penetration Testing Framework. http://www.secfu.net/tools-scripts/

chkrootkit 0.50 Checks for rootkits on a system http://www.chkrootkit.org/

chntpw 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file http://pogostick.net/~pnh/ntpasswd/

chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other http://samy.pl/chownat/

chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords. http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html

chromefreak 22.336e323 A Cross-Platform Forensic Framework for Google Chrome http://osandamalith.github.io/ChromeFreak/

cidr2range 0.9 Script for listing the IP addresses contained in a CIDR netblock http://www.cpan.org/authors/id/R/RA/RAYNERLUC

cintruder 0.2.0 An automatic pentesting tool to bypass captchas. http://cintruder.sourceforge.net/

ciphertest 4.5780d36 A better SSL cipher checker using gnutls. https://github.com/OpenSecurityResearch/ciphertest

cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. http://www.cirt.dk/

cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. http://www.scrypt.net

cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. http://www.blackangels.it

cisco-ocs 0.2 Cisco Router Default Password Scanner. http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner

cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration

cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/

cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool. http://www.arhont.com

cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords. https://github.com/madrisan/cisco7crack

cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords. https://github.com/madrisan/cisco7crack

ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.

climber 23.f614304 Check UNIX/Linux systems for privilege escalation. https://github.com/raffaele-forte/climber

clusterd 129.0f04a49 Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. https://github.com/hatRiot/clusterd

cmospwd 5.0 Decrypts password stored in CMOS used to access BIOS setup. http://www.cgsecurity.org/wiki/CmosPwd

cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running http://code.google.com/p/cms-explorer

cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. http://packetstormsecurity.com/files/64722/cms_few.py.txt.html

codetective 37.f94d9e8 A tool to determine the crypto/encoding algorithm used according to traces of its representation. https://www.digitalloft.org/init/plugin_wiki/page/codetective

complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever http://complemento.sourceforge.net

conscan 1.1 A blackbox vulnerability scanner for the Concre5 CMS. http://nullsecurity.net/tools/scanner.html

cookie-cadger 1.07 An auditing tool for Wi-Fi or wired Ethernet connections. https://cookiecadger.com/

cowpatty 4.6 Wireless WPA/WPA2 PSK handshake cracking utility http://www.wirelessdefence.org/Contents/Files/

cpfinder 0.1 This is a simple script that looks for administrative web interfaces. http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html

cppcheck 1.66 A tool for static C/C++ code analysis http://cppcheck.wiki.sourceforge.net/

cpptest 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. http://cpptest.sourceforge.net/

crackhor 2.ae7d83f A Password cracking utility. https://github.com/CoalfireLabs/crackHOR

crackle 39.3e93196 Crack and decrypt BLE encryption https://github.com/mikeryan/crackle/

crackserver 31.c268a80 An XMLRPC server for password cracking. https://github.com/averagesecurityguy/crack

create-ap 103.9d78068 This script creates a NATed or Bridged WiFi Access Point. https://github.com/oblique/create_ap

creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives. https://code.google.com/p/creddump/

creds 8181.da07974 Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. https://github.com/DanMcInerney/creds.py

creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. http://github.com/ilektrojohn/creepy.git

crunch 3.6 A wordlist generator for all combinations/permutations of a given character set. http://sourceforge.net/projects/crunch-wordlist/

cryptcat 1.2.1 A lightweight version of netcat with integrated transport encryption capabilities. http://sourceforge.net/projects/cryptcat

crypthook 16.bceeb0b TCP/UDP symmetric encryption tunnel wrapper. https://github.com/chokepoint/CryptHook

cryptonark 0.4.9 SSL security checker. http://blog.techstacks.com/cryptonark.html

csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project

ctunnel 0.6 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel. http://nardcore.org/ctunnel

cuckoo 1.1.1 A malware analysis system. http://cuckoosandbox.org/

cupp 3.0 Common User Password Profiler http://www.remote-exploit.org/?page_id=418

cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page. http://cutycapt.sourceforge.net/

cvechecker 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. http://cvechecker.sourceforge.net/

cymothoa 1 A stealth backdooring tool, that inject backdoor's shellcode into an existing process. http://cymothoa.sourceforge.net/

darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html

darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors. http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html

darkjumper 5.8 This tool will try to find every website that host at the same server at your target http://sourceforge.net/projects/darkjumper/

darkmysqli 1.6 Multi-Purpose MySQL Injection Tool https://github.com/BlackArch/darkmysqli

darkstat 3.0.718 Network statistics gatherer (packet sniffer) http://dmr.ath.cx/net/darkstat/

davoset 1.2 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. http://websecurity.com.ua/davoset/

davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target http://code.google.com/p/davtest/

dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. https://github.com/gitdurandal/dbd

dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines http://www.cqure.net/wp/dbpwaudit/

dc3dd 7.1.614 A patched version of dd that includes a number of features useful for computer forensics http://sourceforge.net/projects/dc3dd

dcfldd 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing http://dcfldd.sourceforge.net/

ddrescue 1.18.1 GNU data recovery tool http://www.gnu.org/software/ddrescue/ddrescue.html

deblaze 0.3 A remote method enumeration tool for flex servers http://deblaze-tool.appspot.com/

delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer. https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/

depant 0.3a Check network for services with default passwords. http://midnightresearch.com/projects/depant/

device-pharmer 31.2297642 Opens 1K+ IPs or Shodan search results and attempts to login. https://github.com/DanMcInerney/device-pharmer

dex2jar 0.0.9.13 A tool for converting Android's .dex format to Java's .class format http://code.google.com/p/dex2jar

dff-scanner 1.1 Tool for finding path of predictable resource locations. http://netsec.rs/70/tools.html

dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow. Stable version http://www.netpatch.ru/dhcdrop.html

dhcpig 69.cc4109a Enumerates hosts, subdomains, and emails from a given domain using google https://github.com/kamorin/DHCPig

dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC http://kernel.embedromix.ro/us/

dirb 2.04 A web content scanner, brute forceing for hidden files http://dirb.sourceforge.net/

dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project

directorytraversalscan 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications. http://sourceforge.net/projects/httpdirscan/

dirs3arch 109.c174cda HTTP(S) directory/file brute forcer. https://github.com/maurosoria/dirs3arch

dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more. http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html

dislocker 0.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in. http://www.hsc.fr/ressources/outils/dislocker/

dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html

dissy 10 A graphical frontend to the objdump disassembler for compiler-generated code. http://dissy.googlecode.com/

dizzy 0.8.2 A Python based fuzzing framework with many features. http://www.c0decafe.de/

dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more. http://www.mor-pah.net/

dnmap 0.6 The distributed nmap framework http://sourceforge.net/projects/dnmap/

dns-spoof 12.3918a10 Yet another DNS spoof utility. https://github.com/maurotfilho/dns-spoof

dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains. http://packetstormsecurity.com/files/118036/DNS-GeoIP.html

dns2tcp 0.5.2 A tool for relaying TCP connections over DNS. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en

dnsa 0.5 DNSA is a dns security swiss army knife http://packetfactory.openwall.net/projects/dnsa/index.html

dnsbf 0.2 search for available domain names in an IP range http://code.google.com/p/dnsbf

dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. https://github.com/d4rkcat/dnsbrute

dnschef 0.2.1 A highly configurable DNS proxy for pentesters http://thesprawl.org/projects/dnschef/

dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS http://nullsecurity.net/tools/dos.html

dnsenum 1.2.4.1 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum

dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies http://nullsecurity.net/tools/scanner.html

dnsmap 0.30 Passive DNS network mapper http://dnsmap.googlecode.com

dnspredict 0.0.2 DNS prediction http://johnny.ihackstuff.com

dnsrecon 0.8.8 Python script for enumeration of hosts, subdomains and emails from a given domain using google. https://github.com/darkoperator/dnsrecon

dnsspider 0.5 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. http://nullsecurity.net/tools/scanner.html

dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers http://www.mavetju.org/unix/dnstracer.php

dnsutils 9.9.2.P2 DNS utilities: dig host nslookup http://www.isc.org/software/bind/

dnswalk 2.0.2 A DNS debugger http://sourceforge.net/projects/dnswalk/

domain-analyzer 0.8.1 Finds all the security information for a given domain name. http://sourceforge.net/projects/domainanalyzer/

doona 118.ff1e17b A fork of the Bruteforce Exploit Detector Tool (BED). https://github.com/wireghoul/doona

dotdotpwn 3.0 The Transversal Directory Fuzzer http://dotdotpwn.blogspot.com

dpeparser beta002 Default password enumeration project http://www.toolswatch.org/dpe/

dpscan 0.1 Drupal Vulnerabilty Scanner. https://github.com/insaneisnotfree/Blue-Sky-Information-Security

dradis 2.9.0 An open source framework to enable effective information sharing. http://dradisframework.org/

driftnet 0.1.6 Listens to network traffic and picks out images from TCP streams it observes. http://www.ex-parrot.com/~chris/driftnet/

dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. http://www.blackhatlibrary.net/Dripper

dscanner 593.a942dd1 Swiss-army knife for D source code. https://github.com/Hackerpilot/Dscanner

dsd 82.cc1fb3b Digital Speech Decoder https://github.com/szechyjs/dsd

dsniff 2.4b1 Collection of tools for network auditing and penetration testing http://www.monkey.org/~dugsong/dsniff/

dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS. https://github.com/0verl0ad/Dumb0

dump1090 309.a17e5b0 A simple Mode S decoder for RTLSDR devices. https://github.com/MalcolmRobb/dump1090

dumpacl 0.0 Dumps NTs ACLs and audit settings. http://www.systemtools.com/cgi-bin/download.pl?DumpAcl

dumpzilla 03152013 A forensic tool for firefox. http://www.dumpzilla.org/

eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol http://www.willhackforsushi.com/?page_id=67

easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant). http://www.mh-sec.de/downloads.html.en

eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html

edb 0.9.20 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg. http://www.codef00.com/projects.php#Debugger

eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes) http://www.jonesdykstra.com/

elettra 1.0 Encryption utility by Julia Identity http://www.winstonsmith.info/julia/elettra/

elettra-gui 1.0 Gui for the elettra crypto application. http://www.winstonsmith.info/julia/elettra/

elite-proxy-finder 41.ce57afa Finds public elite anonymity proxies and concurrently tests them. https://github.com/DanMcInerney/elite-proxy-finder

enabler 1 attempts to find the enable password on a cisco system via brute force. http://packetstormsecurity.org/cisco/enabler.c

encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html

ent 1.0 Pseudorandom number sequence test. http://www.fourmilab.ch/random

enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account. https://github.com/dejanlevaja/enum_shares

enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems. http://labs.portcullis.co.uk/application/enum4linux/

enumiax 1.0 IAX enumerator http://sourceforge.net/projects/enumiax/

enyelkm 1.2 Rootkit for Linux x86 kernels v2.6. http://www.enye-sec.org/programas.html

epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. http://sourceforge.net/projects/epicwebhoneypot/

erase-registrations 1.0 IAX flooder http://www.hackingexposedvoip.com/

etherape 0.9.13 A graphical network monitor for various OSI layers and protocols http://etherape.sourceforge.net/

ettercap 0.8.1 A network sniffer/interceptor/logger for ethernet LANs - console http://ettercap.github.com/ettercap/

evilgrade 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates http://www.infobyte.com.ar/developments.html

evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password http://theinvisiblethings.blogspot.com

exiv2 0.24 Exif and Iptc metadata manipulation library and tools http://exiv2.org

exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks http://www.exploit-db.com

extracthosts 14.ec8b89c Extracts hosts (IP/Hostnames) from files. https://github.com/bwall/ExtractHosts

extundelete 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal http://extundelete.sourceforge.net

eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability http://www.pentest.co.uk

eyewitness 249.3884021 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness

facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). https://github.com/emerinohdz/FaceBrute

fakeap 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. http://www.blackalchemy.to/project/fakeap/

fakedns 17.87d4216 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses. https://github.com/Crypt0s/FakeDns

fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing. http://sourceforge.net/projects/fakemail/

fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. https://github.com/mubix/FakeNetBIOS

fang 1.2 A multi service threaded MD5 cracker. https://github.com/evilsocket/fang

fbht r12.a284878 A Facebook Hacking Tool https://github.com/chinoogawa/fbht-linux

fcrackzip 1.0 Zip file password cracker http://oldhome.schmorp.de/marc/fcrackzip.html

fern-wifi-cracker 219 WEP, WPA wifi cracker for wireless penetration testing http://code.google.com/p/fern-wifi-cracker/

fernmelder 6.c6d4ebe Asynchronous mass DNS scanner. https://github.com/stealth/fernmelder

fgscanner 11.893372c An advanced, opensource URL scanner. http://www.fantaghost.com/fgscanner

fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html

fierce 0.9.9 A DNS scanner http://ha.ckers.org/fierce/

fiked 0.0.5 Fake IDE daemon http://www.roe.ch/FakeIKEd

filibuster 161.37b7f9c A Egress filter mapping application with additional functionality. https://github.com/subinacls/Filibuster

fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation http://code.google.com/p/fimap/

findmyhash 1.1.2 Crack different types of hashes using free online services http://code.google.com/p/findmyhash/

firewalk 5.0 An active reconnaissance network security tool http://packetfactory.openwall.net/projects/firewalk/

firmware-mod-kit 099 Modify firmware images without recompiling! http://code.google.com/p/firmware-mod-kit

firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points. https://github.com/nccgroup/firstexecution

fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. http://lcamtuf.coredump.cx/

flare 0.6 Flare processes an SWF and extracts all scripts from it. http://www.nowrap.de/flare.html

flasm 1.62 Disassembler tool for SWF bytecode http://www.nowrap.de/flasm.html

flawfinder 1.31 Searches through source code for potential security flaws. http://www.dwheeler.com/flawfinder

flowinspect 94.01c8921 A network traffic inspection tool. https://github.com/7h3rAm/flowinspect

flunym0us 2.0 A Vulnerability Scanner for Wordpress and Moodle. http://code.google.com/p/flunym0us/

foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures http://foremost.sourceforge.net/

fpdns 0.9.3 Program that remotely determines DNS server versions http://code.google.com/p/fpdns/

fping 3.9 A utility to ping multiple hosts at once http://www.fping.org/

fport 2.0 Identify unknown open ports and their associated applications. http://www.foundstone.com/us/resources/proddesc/fport.htm

fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6. https://github.com/stealth/fraud-bridge

freeipmi 1.4.5 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). http://www.gnu.org/software/freeipmi/

freeradius 3.0.4 The premier open source RADIUS server http://www.freeradius.org/

frisbeelite 1.2 A GUI-based USB device fuzzer. https://github.com/nccgroup/FrisbeeLite

fs-nyarl 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. http://www.fulgursecurity.com/en/content/fs-nyarl

fsnoop 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods"). http://vladz.devzero.fr/fsnoop.php

fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines. http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html

ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. http://www.inversepath.com/ftester.html

ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server sofware http://nullsecurity.net/tools/fuzzer.html

ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/

ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. http://packetstormsecurity.com/files/35120/ftp-spider.pl.html

ftpmap 0.4 scans remote FTP servers to identify what software and what versions they are running. http://wcoserver.googlecode.com/files/

fusil 1.4 Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files http://bitbucket.org/haypo/fusil/wiki/Home

fuzzap 14.f13932c A python script for obfuscating wireless networks. https://github.com/lostincynicism/FuzzAP

fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. http://nologin.org/

fuzzdb 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing https://code.google.com/p/fuzzdb/

fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. http://vsecurity.com/resources/tool

fuzztalk 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. https://code.google.com/p/fuzztalk

g72x++ 1 Decoder for the g72x++ codec. http://www.ps-auxw.de/

galleta 20040505_1 Examine the contents of the IE's cookie files for forensic purposes http://www.jonesdykstra.com/

gdb 7.8 The GNU Debugger http://www.gnu.org/software/gdb/

genlist 0.1 Generates lists of IP addresses.

geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).

geoip 1.6.2 Non-DNS IP-to-country resolver C library & utils http://www.maxmind.com/app/c

geoipgen 0.4 GeoIPgen is a country to IP addresses generator. http://code.google.com/p/geoipgen/

getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. http://www.cqure.net/wp/getsids/

gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. http://www.morningstarsecurity.com/research/gggooglescan

ghettotooth 1.0 Ghettodriving for bluetooth http://www.oldskoolphreak.com/tfiles/ghettotooth.txt

ghost-phisher 1.62 GUI suite for phishing and penetration attacks http://code.google.com/p/ghost-phisher

ghost-py 0.1b3 Webkit based webclient (relies on PyQT). http://jeanphix.github.com/Ghost.py/

giskismet 20110805 A program to visually represent the Kismet data in a flexible manner. http://www.giskismet.org

gnuradio 3.7.5 General purpose DSP and SDR toolkit. With drivers for usrp and fcd. http://gnuradio.org

gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2) http://gnutls.org/

goldeneye 16.7a38fe9 A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. https://github.com/jseidl/GoldenEye

golismero 2.0 Opensource web security testing framework. https://github.com/golismero/golismero

goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. http://goo-dork.blogspot.com/

goofile 1.5 Command line filetype search https://code.google.com/p/goofile/

goog-mail 1.0 Enumerate domain emails from google. http://www.darkc0de.com/others/goog-mail.py

googlesub 1.2 A python script to find domains by using google dorks. https://github.com/zombiesam/googlesub

gooscan 1.0.9 A tool that automates queries against Google search appliances, but with a twist. http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/

gqrx 2.3.1 Interactive SDR receiver waterfall for many devices. http://gqrx.dk/

grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website. http://rgaucher.info/beta/grabber/

grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2 http://www.irongeek.com/downloads/grepforrfi.txt

grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files. http://code.google.com/p/grokevt/

gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts. http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html

gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. http://www.c0decafe.de/

guymager 0.7.3 A forensic imager for media acquisition. http://guymager.sourceforge.net/

gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet. http://packetstormsecurity.com/files/62047/gwcheck.c.html

gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls. http://www.gdssecurity.com/l/t/d.php?k=GwtEnum

hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools http://www.hackersh.org/

halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. http://halberd.superadditive.com/

halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. http://www.blackhatlibrary.net/Halcyon

hamster 2.0.0 Tool for HTTP session sidejacking. http://hamster.erratasec.com/

handle 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,.. http://www.tarasco.org/security/handle/index.html

hasere 1.0 Discover the vhosts using google and bing. https://github.com/galkan/hasere

hash-identifier 1.1 Identifies the different types of hashes used to encrypt data, especially passwords http://code.google.com/p/hash-identifier

hashcat 0.47 A multithreaded cross platform hash cracker. http://hashcat.net/hashcat/

hashcat-utils 1.0 Utilites for Hashcat http://hashcat.net/wiki/doku.php?id=hashcat_utils

hasher 32.e9d1394 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. https://github.com/ChrisTruncer/Hasher

hashid 2.6.0 Software to identify the different types of hashes used to encrypt data https://github.com/psypanda/hashID

hashpump 31.2819f23 A tool to exploit the hash length extension attack in various hashing algorithms. https://github.com/bwall/HashPump

hashtag 0.41 A python script written to parse and identify password hashes. https://github.com/SmeegeSec/HashTag

haystack 1035.ac2ffa4 A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics. https://github.com/trolldbois/python-haystack

hbad 1.0 This tool allows you to test clients on the heartbleed bug. http://www.curesec.com/

hcraft 1.0.0 HTTP Vuln Request Crafter http://sourceforge.net/projects/hcraft/

hdcp-genkey 18.e8d342d Generate HDCP source and sink keys from the leaked master key. https://github.com/rjw57/hdcp-genkey

hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices. https://github.com/ApertureLabsLtd/hdmi-sniff

heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt

hex2bin 1.0.7 Converts Motorola and Intel hex files to binary. http://hex2bin.sourceforge.net/

hexinject 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access. http://hexinject.sourceforge.net

hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). https://code.google.com/p/hexorbase/

hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html

hidattack 0.1 HID Attack (attacking HID host implementations) http://mulliner.org/bluetooth/hidattack.php

honeyd 1.6.7 A small daemon that creates virtual hosts on a network. https://github.com/DataSoft/Honeyd/

honssh 43.46d8a98 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. https://code.google.com/p/honssh/

hookanalyser 3.0 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. http://hookanalyser.blogspot.de/

host-extract 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. https://code.google.com/p/host-extract/

hostbox-ssh 0.1.1 A ssh password/account scanner. http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/

hotpatch 0.2 Hot patches executables on Linux using .so file injection http://www.selectiveintellect.com/hotpatch.html

hotspotter 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. http://www.remote-exploit.org/?page_id=418

hpfeeds 138.249b2f7 Honeynet Project generic authenticated datafeed protocol. https://github.com/rep/hpfeeds

hping 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer. http://www.hping.org

hqlmap 35.081395e A tool to exploit HQL Injections. https://github.com/PaulSec/HQLmap

htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process http://www.mkit.com.ar/labs/htexploit/

htrosbif 134.9dc3f86 Active HTTP server fingerprinting and recon tool. https://github.com/lkarsten/htrosbif

htshells 760b5e9 Self contained web shells and other attacks via .htaccess files. https://github.com/wireghoul/htshells

http-enum 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver. https://www.thexero.co.uk/tools/http-enum/

http-fuzz 0.1 A simple http fuzzer. none

http-put 1.0 Simple http put perl script

http-traceroute 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality. http://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html

httpbog 1.0.0.0 A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. http://sourceforge.net/projects/httpbog/

httpforge 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions. http://packetstormsecurity.com/files/98109/HTTPForge.02.01.html

httping 2.3.4 A 'ping'-like tool for http-requests. http://www.vanheusden.com/httping/

httprint 301 A web server fingerprinting tool. http://www.net-square.com/httprint.html

httprint-win32 301 A web server fingerprinting tool (Windows binaries). http://net-square.com/httprint

httpry 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic. http://dumpsterventures.com/jason/httpry/

httpsniff 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review. http://www.sump.org/projects/httpsniff/

httpsscanner 1.2 A tool to test the strength of a SSL web server. https://code.google.com/p/libre-tools/

httptunnel 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests http://www.nocrew.org/software/httptunnel

hulk 11.a9b9ad4 A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features. https://github.com/grafov/hulk

hwk 0.4 Collection of packet crafting and wireless network flooding tools http://www.nullsecurity.net/

hydra 8.0 A very fast network logon cracker which support many different services. http://www.thc.org/thc-hydra/

hyenae 0.36_1 flexible platform independent packet generator http://sourceforge.net/projects/hyenae/

hyperion 1.1 A runtime encrypter for 32-bit portable executables. http://nullsecurity.net/tools/binary.html

iaxflood 0.1 IAX flooder. http://www.hackingexposedvoip.com/

iaxscan 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. http://code.google.com/p/iaxscan/

ibrute 12.3a6a11e An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented. https://github.com/hackappcom/ibrute/

icmpquery 1.0 Send and receive ICMP queries for address mask and current time. http://www.angio.net/security/

icmptx 0.01 IP over ICMP http://thomer.com/icmptx/

iheartxor 0.01 iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255. http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html

ike-scan 1.9 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers http://www.nta-monitor.com/tools/ike-scan/

ikecrack 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication http://sourceforge.net/projects/ikecrack/

ikeprobe 0.1 Determine vulnerabilities in the PSK implementation of the VPN server. http://www.ernw.de/download/ikeprobe.zip

ikeprober 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors http://ikecrack.sourceforge.net/

ilty 1.0 An interception phone system for VoIP network. http://chdir.org/~nico/ilty/

inception 415.7f32b49 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. http://www.breaknenter.org/projects/inception/

indxparse 145.ac5f59b A Tool suite for inspecting NTFS artifacts. http://www.williballenthin.com/forensics/mft/indxparse/

inetsim 1.2.5 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. http://www.inetsim.org

infip 0.1 A python script that checks output from netstat against RBLs from Spamhaus. http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html

inguma 0.1.1 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler. http://inguma.sourceforge.net

intercepter-ng 0.9.8 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc. http://intercepter.nerf.ru/#down

interrogate 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. https://github.com/carmaa/interrogate

intersect 2.5 Post-exploitation framework https://github.com/ohdae/Intersect.5

intrace 1.5 Traceroute-like application piggybacking on existing TCP connections http://intrace.googlecode.com

inundator 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack. http://inundator.sourceforge.net/

inviteflood 2.0 Flood a device with INVITE requests https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635

iodine 0.7.0 Tunnel IPv4 data through a DNS server http://code.kryo.se/iodine

iosforensic 1.0 iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic https://github.com/Flo354/iOSForensic

ip-https-tools 5.b22e2b3 Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol. https://github.com/takeshixx/ip-https-tools

ipaudit 1.0BETA2 IPAudit monitors network activity on a network. http://ipaudit.sourceforge.net

ipba2 032013 IOS Backup Analyzer http://www.ipbackupanalyzer.com/

ipdecap 68.d13705d Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header. http://www.loicp.eu/ipdecap#dependances

iphoneanalyzer 2.1.0 Allows you to forensically examine or recover date from in iOS device. http://www.crypticbit.com/zen/products/iphoneanalyzer

ipmitool 1.8.14 Provides a simple command-line interface to IPMI-enabled devices through an IPMIv1.5 or IPMIv2.0 LAN interface or Linux/Solaris kernel driver. http://sourceforge.net/projects/ipmitool/

ipscan 3.2.1 Angry IP scanner is a very fast IP address and port scanner. http://www.angryziber.com

iputils 20121221 Network monitoring tools, including ping http://www.skbuff.net/iputils/

ipv6toolkit 2.0beta SI6 Networks' IPv6 Toolkit http://www.si6networks.com/tools/ipv6toolkit/

ircsnapshot 93.9ba3c6c Tool to gather information from IRC servers. https://github.com/bwall/ircsnapshot

irpas 0.10 Internetwork Routing Protocol Attack Suite. http://phenoelit-us.org/irpas

isr-form 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. http://www.infobyte.com.ar/

jad 1.5.8e Java decompiler http://www.varaneckas.com/jad

javasnoop 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer https://code.google.com/p/javasnoop/

jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access. https://github.com/SpiderLabs/jboss-autopwn

jbrofuzz 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing. http://sourceforge.net/projects/jbrofuzz/

jbrute 0.99 Open Source Security tool to audit hashed passwords. http://sourceforge.net/projects/jbrute/

jd-gui 0.3.5 A standalone graphical utility that displays Java source codes of .class files http://java.decompiler.free.fr/?q=jdgui

jhead 2.97 EXIF JPEG info parser and thumbnail remover http://www.sentex.net/~mwandel/jhead/

jigsaw 1.3 A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing. https://github.com/pentestgeek/jigsaw

jnetmap 0.5.3 A network monitor of sorts http://www.rakudave.ch/jnetmap/?file=introduction

john 1.7.9 John The Ripper - A fast password cracker (jumbo included) http://www.openwall.com/john/

johnny 20120424 GUI for John the Ripper. http://openwall.info/wiki/john/johnny

jomplug 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components. http://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html

joomlascan 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files. http://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html

joomscan 2012.03.10 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. http://joomscan.sourceforge.net/

js-beautify 1.4.2 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com. https://github.com/einars/js-beautify

jsql 0.5 A lightweight application used to find database information from a distant server. https://code.google.com/p/jsql-injection/

junkie 1174.6c188a9 A modular packet sniffer and analyzer. https://github.com/securactive/junkie

jynx2 2.0 An expansion of the original Jynx LD_PRELOAD rootkit http://www.blackhatlibrary.net/Jynx2

katsnoop 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form. http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html

kautilya 0.5.0 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices http://code.google.com/p/kautilya

keimpx 0.2 Tool to verify the usefulness of credentials across a network over SMB. http://code.google.com/p/keimpx/

khc 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents. http://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html

killerbee 85 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks. https://code.google.com/p/killerbee/

kippo 0.8 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. http://code.google.com/p/kippo/

kismet 2013_03_R1b 802.11 layer2 wireless network detector, sniffer, and intrusion detection system http://www.kismetwireless.net/

kismet-earth 0.1 Various scripts to convert kismet logs to kml file to be used in Google Earth. http://

kismet2earth 1.0 A set of utilities that convert from Kismet logs to Google Earth .kml format http://code.google.com/p/kismet2earth/

klogger 1.0 A keystroke logger for the NT-series of Windows. http://ntsecurity.nu/toolbox/klogger/

kolkata 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. http://www.blackhatlibrary.net/Kolkata

kraken 32.368a837 A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack. http://opensource.srlabs.de/projects/a51-decrypt

laf 12.7a456b3 Login Area Finder: scans host/s for login panels. https://github.com/takeshixx/laf

lanmap2 124.4f8afed Passive network mapping tool http://github.com/rflynn/lanmap2

lans 1.0 A Multithreaded asynchronous packet parsing/injecting arp spoofer. https://github.com/DanMcInerney/LANs.py

latd 1.31 A LAT terminal daemon for Linux and BSD. http://sourceforge.net/projects/linux-decnet/files/latd/1.31/

laudanum 1.0 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments. http://laudanum.inguardians.com/#

lbd 20130719 Load Balancing detector http://ge.mine.nu/code/lbd

lbmap 145.93e6b71 Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012. https://github.com/wireghoul/lbmap

ldapenum 0.1 Enumerate domain controllers using LDAP. https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/

leo 4.11 Literate programmer's editor, outliner, and project manager http://webpages.charter.net/edreamleo/front.html

leroy-jenkins 0.r3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes. https://github.com/captainhooligan/Leroy-Jenkins

levye 85.419e817 A brute force tool which is support sshkey, vnckey, rdp, openvpn. https://github.com/galkan/levye

lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI http://www.blackhatlibrary.net/Lfi_autopwn.pl

lfi-exploiter 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.. http://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html

lfi-fuzzploit 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. http://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html

lfi-scanner 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target. http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html

lfi-sploiter 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities. http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html

lfimap 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver. https://code.google.com/p/lfimap/

lft 3.72 A layer four traceroute implementing numerous other features. http://pwhois.org/lft/

libdisasm 0.23 A disassembler library. http://bastard.sourceforge.net/libdisasm.html

libpst 0.6.63 Outlook .pst file converter http://www.five-ten-sg.com/libpst/

liffy 63.238ce6d A Local File Inclusion Exploitation tool. https://github.com/rotlogix/liffy

linenum 18.b4c2541 Scripted Local Linux Enumeration & Privilege Escalation Checks https://github.com/rebootuser/LinEnum

linux-exploit-suggester 0.r32.9db2f5a A Perl script that tries to suggest exploits based OS version number https://github.com/PenturaLabs/Linux_Exploit_Suggester

list-urls 0.1 Extracts links from webpage http://www.whoppix.net

littleblackbox 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices. http://code.google.com/p/littleblackbox/wiki/FAQ

lodowep 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system. http://www.cqure.net/wp/lodowep/

logkeys 0.1.1a Simple keylogger supporting also USB keyboards. http://logkeys.googlecode.com/

loki 0.2.7 Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols http://c0decafe.de/loki.html

lorcon 2.0.0.20091101 Generic library for injecting 802.11 frames http://802.11ninja.net/

lotophagi 0.1 a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases. http://packetstormsecurity.com/files/55250/lotophagi.rar.html

lsrtunnel 0.2 lsrtunnel spoofs connections using source routed packets. http://www.synacklabs.net/projects/lsrtunnel/

luksipc 0.01 A tool to convert unencrypted block devices to encrypted LUKS devices in-place. http://www.johannes-bauer.com/linux/luksipc

lynis 1.6.2 An auditing tool for Unix (specialists). http://www.rootkit.nl/projects/lynis.html

mac-robber 1.02 A digital investigation tool that collects data from allocated files in a mounted file system. http://www.sleuthkit.org/mac-robber/download.php

macchanger 1.6.0 A small utility to change your NIC's MAC address http://ftp.gnu.org/gnu/macchanger

maclookup 0.3 Lookup MAC addresses in the IEEE MA-L/OUI public listing. https://github.com/paraxor/maclookup

magicrescue 1.1.9 Find and recover deleted files on block devices http://freshmeat.net/projects/magicrescue/

magictree 1.3 A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation http://www.gremwell.com

make-pdf 0.1.4 This tool will embed javascript inside a PDF document http://blog.didierstevens.com/programs/pdf-tools/

makepasswd 1.10_9 Generates true random passwords with the emphasis on security over pronounceability (Debian version) http://packages.qa.debian.org/m/makepasswd.html

malheur 0.5.4 A tool for the automatic analyze of malware behavior. http://www.mlsec.org/malheur/

maligno 1.2 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. http://www.encripto.no/tools/

malmon 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor. http://sourceforge.net/projects/malmon/

maltego 3.4.0.5004 An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc. http://www.paterva.com/web5

maltrieve 127.b177b25 Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites. https://github.com/technoskald/maltrieve

malware-check-tool 1.2 Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature. http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html

malwareanalyser 3.3 A freeware tool to perform static and dynamic analysis on malware. http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html

malwaredetect 0.1 Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware http://www.virustotal.com

malwasm 0.2 Offline debugger for malware's reverse engineering. https://code.google.com/p/malwasm/

marc4dasm 6.f11860f This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro). https://github.com/ApertureLabsLtd/marc4dasm

maskprocessor 0.69 A High-Performance word generator with a per-position configurable charset http://hashcat.net/wiki/doku.php?id=maskprocessor

masscan 381.06d72ed TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. https://github.com/robertdavidgraham/masscan

mat 0.5 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library. https://mat.boum.org/

matahari 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls. http://matahari.sourceforge.net

mausezahn 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. http://www.perihel.at/sec/mz/

mbenum 1.5.0 Queries the master browser for whatever information it has registered. http://www.cqure.net/wp/mbenum/

mboxgrep 0.7.9 Mboxgrep is a small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats. http://mboxgrep.sourceforge.net

md5deep 4.3 Advanced checksum hashing tool http://md5deep.sourceforge.net

mdbtools 0.7.1 Utilities for viewing data and exporting schema from Microsoft Access Database files http://sourceforge.net/projects/mdbtools/

mdcrack 1.2 MD4/MD5/NTLM1 hash cracker http://c3rb3r.openwall.net/mdcrack/

mdk3 6 WLAN penetration tool http://homepages.tu-darmstadt.de/~p_larbig/wlan/

mdns-scan 0.5 Scan mDNS/DNS-SD published services on the local network.

medusa 2.1.1 A speedy, massively parallel, modular, login brute-forcer for network. http://www.foofus.net/jmk/medusa/medusa.html

melkor 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base). http://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html

memdump 1.01 Dumps system memory to stdout, skipping over holes in memory maps. http://www.porcupine.org/forensics/tct.html

memfetch 0.05b dumps any userspace process memory without affecting its execution http://lcamtuf.coredump.cx/

metacoretex 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases. http://metacoretex.sourceforge.net/

metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents http://www.edge-security.com/metagoofil.php

metasploit 27656.a65ee6c An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits. http://www.metasploit.com

metoscan 05 Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. http://www.open-labs.org/

mfcuk 0.3.8 MIFARE Classic Universal toolKit http://code.google.com/p/mfcuk/

mfoc 0.10.7 Mifare Classic Offline Cracker http://code.google.com/p/mfoc/

mfsniffer 0.1 A python script for capturing unencrypted TSO login credentials. http://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html

mibble 2.9.3 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files. http://www.mibble.org/

middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks. http://code.google.com/p/middler/

minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r

miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices http://code.google.com/p/miranda-upnp/

miredo 1.2.6 Teredo client and server. http://www.remlab.net/miredo/

missidentify 1.0 A program to find Win32 applications http://missidentify.sourceforge.net/

missionplanner 1.2.55 A GroundControl Station for Ardupilot. https://code.google.com/p/ardupilot-mega/wiki/Mission

mitmap 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation. http://www.darkoperator.com/tools-and-scripts/

mitmer 22.b01c7fe A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook. https://github.com/husam212/MITMer

mitmf 112.65c8059 A Framework for Man-In-The-Middle attacks written in Python. https://github.com/byt3bl33d3r/MITMf

mitmproxy 0.10.1 SSL-capable man-in-the-middle HTTP proxy http://mitmproxy.org/

mkbrutus 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS. http://mkbrutusproject.github.io/MKBRUTUS/

mobiusft 0.5.20 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. http://savannah.nongnu.org/projects/mobiusft

modscan 0.1 A new tool designed to map a SCADA MODBUS TCP based network. https://code.google.com/p/modscan/

moloch 0.9.2 An open source large scale IPv4 full PCAP capturing, indexing and database system. https://github.com/aol/moloch

monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network. http://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html

morxbrute 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl http://www.morxploit.com/morxbrute/

morxcrack 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords. http://www.morxploit.com/morxcrack/

mp3nema 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data. http://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html

mptcp 1.9.0 A tool for manipulation of raw packets that allows a large number of options. http://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html

ms-sys 2.3.0 A tool to write Win9x-.. master boot records (mbr) under linux - RTM! http://ms-sys.sourceforge.net/

mssqlscan 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers. http://www.cqure.net/wp/mssqlscan/

msvpwn 0.1.r23.g328921b Bypass Windows' authentication via binary patching. https://bitbucket.org/mrabault/msvpwn

mtr 0.85 Combines the functionality of traceroute and ping into one tool (CLI version) http://www.bitwizard.nl/mtr/

multiinjector 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation. http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html

multimac 1.0.3 Multiple MACs on an adapter http://sourceforge.net/projects/multimac/

mutator 51.164132d This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012 https://bitbucket.org/alone/mutator/

mysql2sqlite 1.dd87f4 Converts a mysqldump file into a Sqlite 3 compatible file https://gist.github.com/esperlu/943776

nacker 23.b67bb39 A tool to circumvent 802.1x Network Access Control on a wired LAN. https://github.com/carmaa/nacker

nbnspoof 1.0 NBNSpoof - NetBIOS Name Service Spoofer http://www.mcgrewsecurity.com/tools/nbnspoof/

nbtenum 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. http://reedarvin.thearvins.com/

nbtool 2.bf90c76 Some tools for NetBIOS and DNS investigation, attacks, and communication. http://wiki.skullsecurity.org/Nbtool

nbtscan 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information. http://www.inetcat.net/software/nbtscan.html

ncpfs 2.2.6 Allows you to mount volumes of NetWare servers under Linux. http://www.novell.com/

ncrack 0.4a A high-speed network authentication cracking tool http://nmap.org/ncrack/

ndpi-xplico-svn 6937 Open and Extensible GPLv3 Deep Packet Inspection Library. http://www.ntop.org/products/ndpi/

nemesis 1.4 command-line network packet crafting and injection utility http://nemesis.sourceforge.net/

netactview 0.6.2 A graphical network connections viewer for Linux similar in functionality with Netstat http://netactview.sourceforge.net/index.html

netbios-share-scanner 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources. http://www.secpoint.com/netbios-share-scanner.html

netcommander 1.3 An easy-to-use arp spoofing tool. https://github.com/evilsocket/netcommander

netcon 0.1 A network connection establishment and management script. http://www.paramecium.org/~leendert/

netdiscover 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. http://nixgeneration.com/~jaime/netdiscover/

netmap 0.1.3 Can be used to make a graphical representation of the surounding network. http://netmap.sourceforge.net

netmask 2.3.12 Helps determine network masks http://packages.qa.debian.org/n/netmask.html

netreconn 1.76 A collection of network scan/recon tools that are relatively small compared to their larger cousins. http://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html

netscan 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection). http://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html

netsed 1.2 Small and handful utility design to alter the contents of packets forwarded thru network in real time. http://silicone.homelinux.org/projects/netsed/

netsniff-ng 0.5.8 A high performance Linux network sniffer for packet inspection. http://netsniff-ng.org/

netzob 0.4.1 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols. http://www.netzob.org/

nfcutils 0.3.2 Provides a simple 'lsnfc' command that list tags which are in your NFC device field http://code.google.com/p/nfc-tools

nfex 2.5 A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. It is based off of the code-base from the apparently defunct project tcpxtract. https://code.google.com/p/nfex/

nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share. https://github.com/bonsaiviking/NfSpy

nfsshell 19980519 Userland NFS command tool. http://www.paramecium.org/~leendert/

ngrep 1.45 A grep-like utility that allows you to search for network packets on an interface. http://ngrep.sourceforge.net/

nield 0.5.1 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control. http://nield.sourceforge.net/

nikto 2.1.5 A web server scanner which performs comprehensive tests against web servers for multiple items http://www.cirt.net/nikto2

nimbostratus 54.c7c206f Tools for fingerprintinging and exploiting Amazon cloud infrastructures. https://github.com/andresriancho/nimbostratus

nipper 0.11.7 Network Infrastructure Parser https://www.titania-security.com/

nishang 0.3.5 Using PowerShell for Penetration Testing. https://code.google.com/p/nishang/

nkiller2 2.0 A TCP exhaustion/stressing tool. http://sock-raw.org/projects.html

nmap 6.47 Utility for network discovery and security auditing http://nmap.org/

nmbscan 1.2.6 Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols. http://nmbscan.gbarbier.org/

nomorexor 0.1 Tool to help guess a files 256 byte XOR key by using frequency analysis https://github.com/hiddenillusion/NoMoreXOR

notspikefile 0.1 A Linux based file format fuzzing tool http://packetstormsecurity.com/files/39627/notSPIKEfile.tgz.html

nsdtool 0.1 A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password. http://www.curesec.com/en/publications/tools.html

nsec3walker 20101223 Enumerates domain names using DNSSEC http://dnscurve.org/nsec3walker.html

ntds-decode 0.1 This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database. http://packetstormsecurity.com/files/121543/NTDS-Hash-Decoder.b.html

o-saft 398.bedb49d A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations. https://www.owasp.org/index.php/O-Saft

oat 1.3.1 A toolkit that could be used to audit security within Oracle database servers. http://www.cqure.net/wp/test/

obexstress 0.1 Script for testing remote OBEX service for some potential vulnerabilities. http://bluetooth-pentest.narod.ru/

obfsproxy 0.2.12 A pluggable transport proxy written in Python. https://pypi.python.org/pypi/obfsproxy

oclhashcat 1.30 Worlds fastest WPA cracker with dictionary mutation engine. http://hashcat.net/oclhashcat/

ocs 0.2 Compact mass scanner for Cisco routers with default telnet/enable passwords. http://packetstormsecurity.com/files/119462/OCS-Cisco-Scanner.2.html

ohrwurm 0.1 A small and simple RTP fuzzer. http://mazzoo.de/

ollydbg 201g A 32-bit assembler-level analysing debugger http://www.ollydbg.de

onesixtyone 0.7 An SNMP scanner that sends multiple SNMP requests to multiple IP addresses http://labs.portcullis.co.uk/application/onesixtyone/

onionshare 415.381d046 Securely and anonymously share a file of any size. https://github.com/micahflee/onionshare/

openstego 0.6.1 A tool implemented in Java for generic steganography, with support for password-based encryption of the data. http://www.openstego.info/

opensvp 64.56b2b8f A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack. https://github.com/regit/opensvp

openvas-cli 1.3.0 The OpenVAS Command-Line Interface http://www.openvas.org/

openvas-libraries 7.0.4 The OpenVAS libraries http://www.openvas.org/

openvas-manager 5.0.4 A layer between the OpenVAS Scanner and various client applications http://www.openvas.org/

openvas-scanner 4.0.3 The OpenVAS scanning Daemon http://www.openvas.org/

ophcrack 3.6.0 A free Windows password cracker based on rainbow tables http://ophcrack.sourceforge.net

orakelcrackert 1.00 This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm. http://freeworld.thc.org/thc-orakelcrackert11g/

origami 1.0.0_beta1b A ruby framework designed to parse, analyze, and forge PDF documents. http://security-labs.org/origami/

oscanner 1.0.6 An Oracle assessment framework developed in Java. http://www.cqure.net/wp/oscanner/

ostinato 0.5.1 An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. http://code.google.com/p/ostinato/

osueta 65.90323e2 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack. https://github.com/c0r3dump3d/osueta

owabf 1.3 Outlook Web Access bruteforcer tool. http://netsec.rs/70/tools.html

owtf 547.f9bbe14 The Offensive (Web) Testing Framework. https://www.owasp.org/index.php/OWASP_OWTF

p0f 3.07b Purely passive TCP/IP traffic fingerprinting tool. http://lcamtuf.coredump.cx/p0f3/

pack 0.0.4 Password Analysis and Cracking Kit http://thesprawl.org/projects/pack/

packerid 1.4 Script which uses a PEiD database to identify which packer (if any) is being used by a binary. http://handlers.sans.org/jclausing/

packet-o-matic 351 A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. http://www.packet-o-matic.org/

packeth 1.7.2 A Linux GUI packet generator tool for ethernet. http://packeth.sourceforge.net/

packit 1.0 A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic. http://packit.sourceforge.net/

pacumen 1.92a0884 Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks). https://github.com/bniemczyk/pacumen

padbuster 0.3.3 Automated script for performing Padding Oracle attacks. http://www.gdssecurity.com/l/t.php

paketto 1.10 Advanced TCP/IP Toolkit. http://www.doxpara.com/paketto

panoptic 170.b1bed35 A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability. https://github.com/lightos/Panoptic

paros 3.2.13 Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc. http://www.parosproxy.org

parsero 56.fc5f7ec A robots.txt audit tool. https://github.com/behindthefirewalls/Parsero

pasco 20040505_1 Examines the contents of Internet Explorer's cache files for forensic purposes http://www.jonesdykstra.com/

passcracking 20131214 A little python script for sending hashes to passcracking.com and milw0rm http://github.com/jensp/passcracking

passe-partout 0.1 Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns. http://www.hsc.fr/ressources/outils/passe-partout/index.html.en

passivedns 1.1.3 A network sniffer that logs all DNS server replies for use in a passive DNS setup. https://github.com/gamelinux/passivedns

pastenum 0.4.1 Search Pastebins for content, fork from nullthreat corelan pastenum2 http://github.com/shadowbq/pastenum

patator 80.5a140c1 A multi-purpose bruteforcer. https://github.com/lanjelot/patator

pathod 0.9.2 Crafted malice for tormenting HTTP clients and servers http://pathod.net/

pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities. http://www.edge-security.com/pblind.php

pcapsipdump 0.1.4 pcapsipdump is a tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions). http://pcapsipdump.sourceforge.net/

pcredz 0.9 A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface. https://github.com/lgandx/PCredz

pdf-parser 0.4.2 Parses a PDF document to identify the fundamental elements used in the analyzed file http://blog.didierstevens.com/programs/pdf-tools/

pdfbook-analyzer 2 Utility for facebook memory forensics. http://sourceforge.net/projects/pdfbook/

pdfcrack 0.12 Password recovery tool for PDF-files. http://pdfcrack.sourceforge.net/

pdfid 0.1.2 scan a file to look for certain PDF keywords http://blog.didierstevens.com/programs/pdf-tools/

pdfresurrect 0.12 A tool aimed at analyzing PDF documents. http://packetstormsecurity.com/files/118459/PDFResurrect-PDF-Analyzer.12.html

pdgmail 1.0 A password dictionary attack tool that targets windows authentication via the SMB protocol http://www.jeffbryner.com/code/pdgmail

peach 3.0.202 A SmartFuzzer that is capable of performing both generation and mutation based fuzzing http://peachfuzzer.com/

peda 51.327db44 Python Exploit Development Assistance for GDB. https://github.com/longld/peda

peepdf 0.3 A Python tool to explore PDF files in order to find out if the file can be harmful or not http://eternal-todo.com/tools/peepdf-pdf-analysis-tool

pentbox 1.8 A security suite that packs security and stability testing oriented tools for networks and systems. http://www.pentbox.net

perl-image-exiftool 9.70 Reader and rewriter of EXIF informations that supports raw files http://search.cpan.org/perldoc?exiftool

perl-tftp 1.0b3 TFTP - TFTP Client class for perl http://search.cpan.org/~gsm/TFTP/TFTP.pm

pev 0.60 Command line based tool for PE32/PE32+ file analysis http://pev.sourceforge.net/

pextractor 0.18b A forensics tool that can extract all files from an executable file created by a joiner or similar. http://packetstormsecurity.com/files/62977/PExtractor_v0.18b_binary_and_src.rar.html

pgdbf 94.baa1d95 Convert XBase / FoxPro databases to PostgreSQL https://github.com/kstrauser/pgdbf

phoss 0.1.13 Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins. http://www.phenoelit.org/fr/tools.html

php-mt-seed 3.2 PHP mt_rand() seed cracker http://www.openwall.com/php_mt_seed/

php-rfi-payload-decoder 30.bd42caa Decode and analyze RFI payloads developed in PHP. https://github.com/bwall/PHP-RFI-Payload-Decoder

php-vulnerability-hunter 1.4.0.20 An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications. https://phpvulnhunter.codeplex.com/

phpstress 5.f987a7e A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI. https://github.com/nightlionsecurity/phpstress

phrasendrescher 1.2.2 A modular and multi processing pass phrase cracking tool http://www.leidecker.info/projects/phrasendrescher/

pipal 1.1 A password analyser http://www.digininja.org/projects/pipal.php

pirana 0.3.1 Exploitation framework that tests the security of a email content filter. http://www.guay-leroux.com/projects.html

plcscan 0.1 This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols. http://packetstormsecurity.com/files/119726/PLC-Device-Scanner.html

plecost 2 Wordpress finger printer tool search and retrieve information about the plugins versions installed in Wordpress systems. http://code.google.com/p/plecost/

plown 13.ccf998c A security scanner for Plone CMS. https://github.com/unweb/plown

pnscan 1.11 A parallel network scanner that can be used to survey TCP network services. http://www.lysator.liu.se/~pen/pnscan/

pompem 69.b2569c4 A python exploit tool finder. https://github.com/rfunix/Pompem

portspoof 100.70b6bf2 This program's primary goal is to enhance OS security through a set of new techniques. http://portspoof.org/

posttester 0.1 A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin. http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html

powerfuzzer 1_beta Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others. http://www.powerfuzzer.com

powersploit 237.9703400 A PowerShell Post-Exploitation Framework. https://github.com/mattifestation/PowerSploit

praeda 37.093d1c0 An automated data/information harvesting tool designed to gather critical information from various embedded devices. https://github.com/percx/Praeda

prometheus 175.497b2ce A Firewall analyzer written in ruby https://github.com/averagesecurityguy/prometheus

propecia 2 A fast class scanner that scans for a specified open port with banner grabbing http://www.redlevel.org

protos-sip 2 SIP test suite. https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip

proxychains-ng 4.8.1 A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies https://github.com/rofl0r/proxychains

proxycheck 0.1 This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. http://packetstormsecurity.com/files/61864/proxycheck.pl.txt.html

proxyp 2013 Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. http://sourceforge.net/projects/proxyp/

proxyscan 0.3 A security penetration testing tool to scan for hosts and ports through a Web proxy server. http://packetstormsecurity.com/files/69778/proxyScan.3.tgz.html

proxytunnel 1.9.0 a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy http://proxytunnel.sourceforge.net

pscan 1.3 A limited problem scanner for C source files http://deployingradius.com/pscan/

pstoreview 1.0 Lists the contents of the Protected Storage. http://www.ntsecurity.nu/toolbox/pstoreview/

ptunnel 0.72 A tool for reliably tunneling TCP connections over ICMP echo request and reply packets http://www.cs.uit.no/~daniels/PingTunnel/#download

pwd-hash 2.0 A password hashing tool that use the crypt function to generate the hash of a string given on standard input. http://vladz.devzero.fr/pwd-hash.php

pwdump 7.1 Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes. http://www.tarasco.org/security/pwdump_7/index.html

pwnat 0.3 A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other http://samy.pl/pwnat/

pwntools 2.1.3 The CTF framework used by #Gallopsled in every CTF. https://github.com/Gallopsled/pwntools

pyew 2.3.0 A python tool to analyse malware. https://code.google.com/p/pyew/

pyfiscan 930.0326ac3 Free web-application vulnerability and version scanner. https://github.com/fgeek/pyfiscan

pyinstaller 2.1 A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX. http://www.pyinstaller.org/

pyminifakedns 0.1 Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record http://code.activestate.com/recipes/491264/

pyrasite 2.0 Code injection and introspection of running Python processes. http://pyrasite.com/

pyrit 0.4.0 WPA/WPA2-PSK attacking with gpu and cluster http://code.google.com/p/pyrit

pytacle alpha2 Automates the task of sniffing GSM frames http://packetstormsecurity.com/files/124299/pytacle-alpha2.tar.gz

pytbull 2.0 A python based flexible IDS/IPS testing framework shipped with more than 300 tests http://pytbull.sourceforge.net/

python-utidylib 0.2 Python bindings for Tidy HTML parser/cleaner. http://utidylib.berlios.de

python2-yara 3.0.0 A malware identification and classification tool. https://github.com/plusvic/yara

quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing. http://packetstormsecurity.com/files/104314/QuickRecon.3.2.html

radamsa 0.3 General purpose data fuzzer. https://code.google.com/p/ouspg/wiki/Radamsa

radare2 0.9.7 Open-source tools to disasm, debug, analyze and manipulate binary files. http://radare.org/

radiography 2 A forensic tool which grabs as much information as possible from a Windows system. http://www.security-projects.com/?RadioGraPhy

rainbowcrack 1.2 Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches. http://project-rainbowcrack.com/

rarcrack 0.2 This program uses bruteforce algorithm to find correct password (rar, 7z, zip). http://rarcrack.sourceforge.net/

ratproxy 1.58 A passive web application security assessment tool http://code.google.com/p/ratproxy/

rawr 39.aac6a99 Rapid Assessment of Web Resources. A web enumerator. https://bitbucket.org/al14s/rawr/wiki/Home

rcracki-mt 0.7.0 A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com http://rcracki.sourceforge.net/

rdesktop-brute 1.5.0 It connects to windows terminal servers - Bruteforce patch included. http://www.rdesktop.org/

reaver 1.4 Implements a brute force attack against wifi protected setup WPS registrar PINs in order to recover WPA/WPA2 passphrases http://code.google.com/p/reaver-wps

rebind 0.3.4 DNS Rebinding Tool http://code.google.com/p/rebind/

recon-ng 881.39549f3 A full-featured Web Reconnaissance framework written in Python. https://bitbucket.org/LaNMaSteR53/recon-ng

recoverjpeg 2.2.2 Recover jpegs from damaged devices. http://www.rfc1149.net/devel/recoverjpeg

recstudio 4.0_20130717 Cross platform interactive decompiler http://www.backerstreet.com/rec/rec.htm

redfang 2.5 Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name(). http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html

redirectpoison 1.1 A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses. http://www.hackingexposedvoip.com/

regeorg 23.7a38dd6 The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. https://github.com/sensepost/reGeorg

reglookup 1.0.1 Command line utility for reading and querying Windows NT registries http://projects.sentinelchicken.org/reglookup

relay-scanner 1.7 An SMTP relay scanner. http://www.cirt.dk

replayproxy 1.1 Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file. https://code.google.com/p/replayproxy/

responder 114.c05bdfc A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. https:/