Kalitorify – Open Source Tool to Run Kali Linux Traffic Through Tor

Kalitorify is a shell based script for Kali Linux. It uses iptables and TOR to create a transparent proxy. In

Read more

BLACKEYE – Open Source LAN Phishing Tool for Penetration Testing

BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to generate the phishing pages. Some

Read more

Knock – Open Source Subdomain Scanner Tool

Knock is a python based tool for enumerating subdomains on a targeted domain. You can use a custom wordlist and

Read more

Empire – Open Source Post-Exploitation Agent Tool

Empire is regarded as one of the most useful frameworks by many penetration testers. It has many different powershell and

Read more

Blazy – Open Source Modern Login Brute-forcer

I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy is not just another brute-force

Read more

Veil-Framework – Open Source Tool to Bypass Common Anti-Virus Solutions

Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion. You can generate many different

Read more

mitmAP – An Open Source Tool to Create a Fake Access Point and Sniff Data

The Evil Access Point (AP) attack has been around for a long time. There are several ways to create this

Read more

Galileo – Open Source Web Application Auditing Framework

Galileo is a free web application auditing framework that can perform various penetration testing tasks, such as information gathering, fingerprinting,

Read more

Xerosploit – Open Source Toolkit For Man In The Middle Attacks

Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines the power of bettercap and

Read more

Red Hawk – Open Source Information Gathering and Vulnerability Scanning Tool

Red Hawk is an open source tool that is used for information gathering and certain vulnerability scanning. Red Hawk detects

Read more
Do NOT follow this link or you will be banned from the site!