现在的位置: 首页 > 自动控制 > 工业·编程 > 正文

安全工具整理大全

2014-01-17 20:55 工业·编程 ⁄ 共 68550字 ⁄ 字号 暂无评论

0trace
A hop enumeration tool
http://jon.oberheide.org/0trace/

3proxy
Tiny free proxy server
http://3proxy.ru/

3proxy-win32
3proxy tiny free proxy server
http://3proxy.ru/

42zip
Recursive Zip archive bomb.
http://blog.fefe.de/?ts

acccheck
A password dictionary attack tool that targets windows authentication via the SMB protocol.
http://labs.portcullis.co.uk/tools/acccheck/

ace
Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface
http://ucsniff.sourceforge.net/ace.html

admid-pack
ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html

admsnmp
ADM SNMP audit scanner.

aesfix
A tool to find AES key in RAM
http://citp.princeton.edu/memory/code/

aeskeyfind
A tool to find AES key in RAM
http://citp.princeton.edu/memory/code/

afflib
An extensible open format for the storage of disk images and related forensic information
http://www.afflib.org

against
A very fast ssh attacking script which includes a multithreaded port scanning module tcp connect for discovering possible targets and a multithreaded brute-forcing module which attacks parallel multiprocessing all discovered hosts or given ip-adresses from a list
http://nullsecurity.net/tools/cracker.html

aimage
A program to create aff-images.
http://www.afflib.org

airflood
A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.
http://packetstormsecurity.com/files/51127/airflood-0.1.tar.gz.html

airgraph-ng
Graphing tool for the aircrack suite
http://www.aircrack-ng.org

airoscript
Script to simplify the use of aircrack-ng tools
http://midnightresearch.com/projects/wicrawl/

air
A GUI front-end to dd/dc3dd designed for easily creating forensic images.
http://air-imager.sourceforge.net/

airpwn
A tool for generic packet injection on an 802.11 network.
http://airpwn.sourceforge.net

allthevhosts
A vhost discovery tool that scrapes various web applications
http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/

android-sdk
Google Android SDK
http://developer.android.com/sdk/index.html

android-sdk-platform-tools
Platform-Tools for Google Android SDK adb and fastboot
http://developer.android.com/sdk/index.html

android-udev-rules
Android udev rules
https://github.com/bbqlinux/android-udev-rules

arachni
A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.
https://www.arachni-scanner.com

arduino
Arduino SDK includes patched avrdude and librxtx
http://arduino.cc/en/Main/Software

armitage
A graphical cyber attack management tool for Metasploit
http://www.fastandeasyhacking.com/

arpalert
Monitor ARP changes in ethernet networks
http://www.arpalert.org/

arpoison
The UNIX arp cache update utility
http://www.arpoison.net

arpon
A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle MITM attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing APR attacks.
http://arpon.sourceforge.net/

artillery
A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system
https://www.trustedsec.com/downloads/artillery/

asleap
Actively recover LEAP/PPTP passwords.
http://www.willhackforsushi.com/Asleap.html

asp-audit
An ASP fingerprinting tool and vulnerability scanner.
http://seclists.org/basics/2006/Sep/128

autopsy
A GUI for The Sleuth Kit.
http://www.sleuthkit.org/autopsy

backdoor-factory
Patch win32/64 binaries with shellcode
https://github.com/secretsquirrel/the-backdoor-factory

batctl
B.A.T.M.A.N. advanced control and management tool
http://www.open-mesh.net/

batman-adv
batman kernel module, included upstream since .38
http://www.open-mesh.net/

bbqsql
SQL injection exploitation tool
https://github.com/neohapsis/bbqsql

bed
Collection of scripts to test for buffer overflows, format string vulnerabilities.
http://www.aldeid.com/wiki/Bed

beef
BeEF, the Browser Exploitation Framework - it is a penetration testing tool that focuses on the web browser
http://beefproject.com/

beleth
A Multi-threaded Dictionary based SSH cracker
https://github.com/chokepoint/Beleth

bfbtester
Performs checks of single and multiple argument command line overflows and environment variable overflows
http://sourceforge.net/projects/bfbtester/

bing-ip2hosts
Enumerates all hostnames which Bing has indexed for a specific IP address.
http://www.morningstarsecurity.com/research/bing-ip2hosts

binwalk
A tool for searching a given binary image for embedded files
http://code.google.com/p/binwalk/

binwally
Binary and Directory tree comparison tool using the Fuzzy Hashing concept ssdeep
https://github.com/bmaia/binwally

bios_memimage
A tool to dump RAM contents to disk aka cold boot attack.
http://citp.princeton.edu/memory/code/

blackhash
Creates a filter from system hashes
http://16s.us/blackhash/

bletchley
A collection of practical application cryptanalysis tools.
https://code.google.com/p/bletchley/

blindelephant
A web application fingerprinter. Attempts to discover the version of a known web application by comparing static files at known locations
http://blindelephant.sourceforge.net/

blindsql
Set of bash scripts for blind SQL injection attacks
http://www.enye-sec.org/programas.html

bluebugger
An implementation of the bluebug technique which was discovered by Martin Herfurt.
http://packetstormsecurity.com/files/54024/bluebugger-0.1.tar.gz.html

bluelog
A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode
http://www.digifail.com/software/bluelog.shtml

bluepot
A Bluetooth Honeypot written in Java, it runs on Linux
https://code.google.com/p/bluepot/

blueprint
A perl tool to identify Bluetooth devices.
http://trifinite.org/trifinite_stuff_blueprinting.html

blueranger
A simple Bash script which uses Link Quality to locate Bluetooth device radios.
http://www.hackfromacave.com/projects/blueranger.html

bluesnarfer
A bluetooth attacking tool
http://www.alighieri.org/project.html

bob-the-butcher
A distributed password cracker package.
http://btb.banquise.net/

braa
A mass snmp scanner
http://s-tech.elsat.net.pl/braa/

braces
A Bluetooth Tracking Utility.
http://braces.shmoo.com/

browser-fuzzer
Browser Fuzzer 3
http://www.krakowlabs.com/dev.html

brutessh
A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads.
http://www.edge-security.com/edge-soft.php

brutus
One of the fastest, most flexible remote password crackers you can get your hands on.
http://www.hoobie.net/brutus/

bsqlbf
Blind SQL Injection Brute Forcer.
http://code.google.com/p/bsqlbf-v2/

bss
Bluetooth stack smasher / fuzzer
http://www.secuobs.com/news/15022006-bss_0_8.shtml

bt_audit
Bluetooth audit
http://www.betaversion.net/btdsd/download/

bt_audit
Bluetooth audit
http://www.betaversion.net/btdsd/download/

btcrack
The world's first Bluetooth Pass phrase PIN bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.
http://www.nruns.com/_en/security_tools_btcrack.php

btscanner
Bluetooth device scanner.
http://www.pentest.co.uk

bulk-extractor
Bulk Email and URL extraction tool
http://afflib.org

bully
A wifi-protected-setup WPS brute force attack tool.
http://code.google.com/p/bully/

bunny
A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.
http://code.google.com/p/bunny-the-fuzzer/

burpsuite
An integrated platform for attacking web applications free edition.
http://portswigger.net/burp/

canari
A transform framework for maltego
http://www.canariproject.com

capstone
A lightweight multi-platform, multi-architecture disassembly framework.
http://www.capstone-engine.org/index.html

carwhisperer
Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
http://trifinite.org/trifinite_stuff_carwhisperer.html

casefile
The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information
http://www.paterva.com/web6/products/casefile.php

cdpsnarf
Cisco discovery protocol sniffer
https://github.com/Zapotek/cdpsnarf

cewl
A custom word list generator
http://www.digininja.org/projects/cewl.php

checkpwd
Oracle Password Checker Cracker
http://www.red-database-security.com/software/checkpwd.html

checksec
The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.
http://www.trapkit.de/tools/checksec.html

chkrootkit
Checks for rootkits on a system
http://www.chkrootkit.org/

chownat
Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other
http://samy.pl/chownat/

ciphertest
A better SSL cipher checker using gnutls
https://github.com/OpenSecurityResearch/ciphertest

cirt-fuzzer
A simple TCP/UDP protocol fuzzer.
http://www.cirt.dk/

cisco-auditing-tool
Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.
http://www.scrypt.net

cisco-global-exploiter
A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System IOS and Catalyst products.
http://www.blackangels.it

cisco-ocs
Cisco Router Default Password Scanner
http://www.question-defense.com/2013/01/11/ocs-version-0-2-release-ocs-cisco-router-default-password-scanner

cisco-router-config
copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration

ciscos
Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.

cisco-torch
Cisco Torch mass scanning, fingerprinting, and exploitation tool.
http://www.arhont.com

cmospwd
Decrypts password stored in CMOS used to access BIOS setup.
http://www.cgsecurity.org/wiki/CmosPwd

cms-explorer
Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running
http://code.google.com/p/cms-explorer

complemento
A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever
http://complemento.sourceforge.net

conscan
Concrete5 blackbox vulnerability scanner
https://github.com/TheXerocouk/conscan

cookie-cadger
An auditing tool for Wi-Fi or wired Ethernet connections
https://cookiecadger.com/

cowpatty
Wireless WPA/WPA2 PSK handshake cracking utility
http://www.wirelessdefence.org/Contents/Files/

creddump
A python tool to extract various credentials and secrets from Windows registry hives.
https://code.google.com/p/creddump/

creepy
A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.
http://github.com/ilektrojohn/creepy

crosstool-ng
Versatile cross-toolchain generator
http://crosstool-ng.org/

crunch
A wordlist generator for all combinations/permutations of a given character set
http://sourceforge.net/projects/crunch-wordlist/

cryptcat
A lightweight version of netcat with integrated transport encryption capabilities.
http://sourceforge.net/projects/cryptcat

csrftester
The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project

ctunnel
Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
http://nardcore.org/ctunnel

cupp
Common User Password Profiler
http://www.remote-exploit.org/?page_id

cutycapt
A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
http://cutycapt.sourceforge.net/

cymothoa
A stealth backdooring tool, that inject backdoor's shellcode into an existing process.
http://cymothoa.sourceforge.net/

darkd0rk3r
Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
http://packetstormsecurity.com/files/117403/Dark-D0rk3r-1.0.html

darkjumper
This tool will try to find every website that host at the same server at your target
http://sourceforge.net/projects/darkjumper/

darkmysqli
Multi-Purpose MySQL Injection Tool
https://github.com/BlackArch/darkmysqli

dashcam
C/Python dashcam built with Gstreamer for Raspberry Pi/BeagleBone Black
https://github.com/zachhuff386/dashcam

davoset
A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites
http://websecurity.com.ua/davoset/

davtest
Tests WebDAV enabled servers by uploading test executable files, and then optionally uploading files which allow for command execution or other actions directly on the target
http://code.google.com/p/davtest/

dbd
A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.
https://github.com/gitdurandal/dbd

dbpwaudit
A Java tool that allows you to perform online audits of password quality for several database engines
http://www.cqure.net/wp/dbpwaudit/

dc3dd
A patched version of dd that includes a number of features useful for computer forensics
http://sourceforge.net/projects/dc3dd

deblaze
A remote method enumeration tool for flex servers
http://deblaze-tool.appspot.com/

depant
http://midnightresearch.com/projects/depant/

dex2jar
A tool for converting Android's .dex format to Java's .class format
http://code.google.com/p/dex2jar

dff-scanner
Tool for finding path of predictable resource locations.
http://netsec.rs/70/tools.html

dhcdrop
Remove illegal dhcp servers with IP-pool underflow. Stable version
http://www.netpatch.ru/dhcdrop.html

dhcpig
Enumerates hosts, subdomains, and emails from a given domain using google
https://github.com/kamorin/DHCPig

dirb
A web content scanner, brute forceing for hidden files
http://dirb.sourceforge.net/

dirbuster
An application designed to brute force directories and files names on web/application servers
http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project

dmitry
Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.
http://www.mor-pah.net/

dnmap
The distributed nmap framwork
http://sourceforge.net/projects/dnmap/

dns2tcp
A tool for relaying TCP connections over DNS
http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en

dnsa
DNSA is a dns security swiss army knife
http://packetfactory.openwall.net/projects/dnsa/index.html

dnsbf
search for available domain names in an IP range
http://code.google.com/p/dnsbf

dnschef
A highly configurable DNS proxy for pentesters
http://thesprawl.org/projects/dnschef/

dnsdrdos
Proof of concept code for distributed DNS reflection DoS
http://nullsecurity.net/tools/dos.html

dnsenum
Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results
http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue

dnsgoblin
Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies
http://nullsecurity.net/tools/scanner.html

dnsmap
Passive DNS network mapper
http://dnsmap.googlecode.com

dnspredict
DNS prediction
http://johnny.ihackstuff.com

dnsrecon
Python script for enumeration of hosts, subdomains and emails from a given domain using google.
https://github.com/darkoperator/dnsrecon

dnsspider
A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation
http://nullsecurity.net/tools/scanner.html

dnswalk
A DNS debugger
http://sourceforge.net/projects/dnswalk/

dotdotpwn
The Transversal Directory Fuzzer
http://dotdotpwn.blogspot.com

dpeparser
Default password enumeration project
http://www.toolswatch.org/dpe/

dpscan
Drupal Vulnerabilty Scanner
https://github.com/insaneisnotfree/Blue-Sky-Information-Security

dradis
An open source framework to enable effective information sharing.
http://dradisframework.org/

driftnet
Listens to network traffic and picks out images from TCP streams it observes
http://www.ex-parrot.com/~chris/driftnet/

dripper
A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.
http://www.blackhatlibrary.net/Dripper

dumpacl
Dumps NTs ACLs and audit settings.
http://www.systemtools.com/cgi-bin/download.pl?DumpAcl

eapmd5pass
An implementation of an offline dictionary attack against the EAP-MD5 protocol
http://www.willhackforsushi.com/?page_id

easyfuzzer
A flexible fuzzer, not only for web, has a CSV output for efficient output analysis platform independant.
http://www.mh-sec.de/downloads.html.en

edb
A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.
http://www.codef00.com/projects.php#Debugger

eindeutig
Examine the contents of Outlook Express DBX email repository files forensic purposes
http://www.jonesdykstra.com/

elettra-gui
Gui for the elettra crypto application.
http://www.winstonsmith.info/julia/elettra/

elettra
Encryption utility by Julia Identity
http://www.winstonsmith.info/julia/elettra/

enabler
attempts to find the enable password on a cisco system via brute force.
http://packetstormsecurity.org/cisco/enabler.c

ent
Pseudorandom number sequence test.
http://www.fourmilab.ch/random

enum4linux
A tool for enumerating information from Windows and Samba systems.
http://labs.portcullis.co.uk/application/enum4linux/

enumiax
IAX enumerator
http://sourceforge.net/projects/enumiax/

enyelkm
Rootkit for Linux x86 kernels v2.6.
http://www.enye-sec.org/programas.html

erase-registrations
IAX flooder
http://www.hackingexposedvoip.com/

evilgrade
Modular framework that takes advantage of poor upgrade implementations by injecting fake updates
http://www.infobyte.com.ar/developments.html

evilmaid
TrueCrypt loader backdoor to sniff volume password
http://theinvisiblethings.blogspot.com

exploit-db
The Exploit Database EDB – an ultimate archive of exploits and vulnerable software - A collection of hacks
http://www.exploit-db.com

fakeap
Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames.
http://www.blackalchemy.to/project/fakeap/

fakedns
A regular-expression based python MITM DNS server with correct DNS request passthrough and \"Not Found\" responses.
https://github.com/Crypt0s/FakeDns

fakemail
Fake mail server that captures e-mails as files for acceptance testing.
http://sourceforge.net/projects/fakemail/

fang
A multi service threaded MD5 cracker
https://github.com/evilsocket/fang

fern-wifi-cracker
WEP, WPA wifi cracker for wireless penetration testing
http://code.google.com/p/fern-wifi-cracker/

fierce
A DNS scanner
http://ha.ckers.org/fierce/

fiked
Fake IDE daemon
http://www.roe.ch/FakeIKEd

fimap
A little tool for local and remote file inclusion auditing and exploitation
http://code.google.com/p/fimap/

findmyhash
Crack different types of hashes using free online services
http://code.google.com/p/findmyhash/

firewalk
An active reconnaissance network security tool
http://packetfactory.openwall.net/projects/firewalk/

firmware-mod-kit
Modify firmware images without recompiling!
http://code.google.com/p/firmware-mod-kit

flare
Flare processes an SWF and extracts all scripts from it.
http://www.nowrap.de/flare.html

flasm
Disassembler tool for SWF bytecode
http://www.nowrap.de/flasm.html

flawfinder
Searches through source code for potential security flaws
http://www.dwheeler.com/flawfinder

foremost
A console program to recover files based on their headers, footers, and internal data structures
http://foremost.sourceforge.net/

fpdns
Program that remotely determines DNS server versions
http://code.google.com/p/fpdns/

fport
Identify unknown open ports and their associated applications.
http://www.foundstone.com/us/resources/proddesc/fport.htm

ftester
A tool designed for testing firewall filtering policies and Intrusion Detection System IDS capabilities.
http://www.inversepath.com/ftester.html

ftp-fuzz
The master of all master fuzzing scripts specifically targeted towards FTP server sofware
http://nullsecurity.net/tools/fuzzer.html

ftpmap
scans remote FTP servers to identify what software and what versions
http://wcoserver.googlecode.com/files/

fusil
Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment limit memory, environment variables, redirect stdout, etc., start network client or server, and create mangled files
http://bitbucket.org/haypo/fusil/wiki/Home

fuzzball2
A little fuzzer for TCP and IP options. It sends a bunch of more or
http://nologin.org/

fuzzdb
Attack and Discovery Pattern Database for Application Fuzz Testing
https://code.google.com/p/fuzzdb/

fuzzdiff
A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.
http://vsecurity.com/resources/tool

g72x++
Decoder for the g72x++ codec.
http://www.ps-auxw.de/

galleta
Examine the contents of the IE's cookie files for forensic purposes
http://www.jonesdykstra.com/

genlist
Generates lists of IP addresses.

geoedge
This little tools is designed to get geolocalization information of a host, it get the information from two sources maxmind and geoiptool.

geoipgen
GeoIPgen is a country to IP addresses generator.
http://code.google.com/p/geoipgen/

getsids
Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’.
http://www.cqure.net/wp/getsids/

ghettotooth
Ghettodriving for bluetooth
http://www.oldskoolphreak.com/tfiles/ghettotooth.txt

ghost-phisher
GUI suite for phishing and penetration attacks
http://code.google.com/p/ghost-phisher

giskismet
A program to visually represent the Kismet data in a flexible manner.
http://www.giskismet.org

golismero
Opensource web security testing framework
https://github.com/golismero/golismero

goodork
A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
http://goo-dork.blogspot.com/

goofile
Command line filetype search
https://code.google.com/p/goofile/

goog-mail
Enumerate domain emails from google.
http://www.darkc0de.com/others/goog-mail.py

gooscan
A tool that automates queries against Google search appliances, but with a twist.
http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid

gqrx
SDR receiver for Funcube Dongle, RTL-SDR, USRP and OsmoSDR devices
http://www.oz9aec.net/index.php/gnu-radio/gqrx-sdr

grabber
A web application scanner. Basically it detects some kind of vulnerabilities in your website.
http://rgaucher.info/beta/grabber/

grepforrfi
Simple script for parsing web logs for RFIs and Webshells v1.2
http://www.irongeek.com/downloads/grepforrfi.txt

grokevt
A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.
http://code.google.com/p/grokevt/

gsa
OpenVAS web frontend
http://www.openvas.org/

gsd
OpenVAS GUI frontend
http://www.openvas.org/

guymager
A forensic imager for media acquisition
http://guymager.sourceforge.net/

gwtenum
Enumeration of GWT-RCP method calls.
http://www.gdssecurity.com/l/t/d.php?k

hackersh
A shell for with Pythonect-like syntax, including wrappers for commonly used security tools
http://www.hackersh.org/

halberd
Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.
http://halberd.superadditive.com/

halcyon
A repository crawler that runs checksums for static files found within a given git repository.
http://www.blackhatlibrary.net/Halcyon

hamster
Tool for HTTP session sidejacking.
http://hamster.erratasec.com/

handle
An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..
http://www.tarasco.org/security/handle/index.html

hashcat
A multithreaded cross platform hash cracker.
http://hashcat.net/hashcat/

hashcat-utils
Utilites for Hashcat
http://hashcat.net/wiki/doku.php?id

hash-identifier
Identifies the different types of hashes used to encrypt data, especially passwords
http://code.google.com/p/hash-identifier

hashtag
A python script written to parse and identify password hashes.
https://github.com/SmeegeSec/HashTag

hcraft
HTTP Vuln Request Crafter
http://sourceforge.net/projects/hcraft/

hexinject
A very versatile packet injector and sniffer that provides a command-line framework for raw network access
http://hexinject.sourceforge.net

hexorbase
A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL.
https://code.google.com/p/hexorbase/

hidattack
HID Attack attacking HID host implementations
http://mulliner.org/bluetooth/hidattack.php

honeyd
A small daemon that creates virtual hosts on a network.
https://github.com/DataSoft/Honeyd/

hotpatch
Hot patches executables on Linux using .so file injection
http://www.selectiveintellect.com/hotpatch.html

hotspotter
Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.
http://www.remote-exploit.org/?page_id

htexploit
A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process
http://www.mkit.com.ar/labs/htexploit/

htshells
Self contained web shells and other attacks via .htaccess files.
https://github.com/wireghoul/htshells

http-enum
A tool to enumerate the enabled HTTP methods supported on a webserver.
https://www.thexero.co.uk/tools/http-enum/

http-fuzz
A simple http fuzzer.
none

httping
A 'ping'-like tool for http-requests.
http://www.vanheusden.com/httping/

http-put
Simple http put perl script

httprint
A web server fingerprinting tool.
http://www.net-square.com/httprint.html

httprint-win32
A web server fingerprinting tool Windows binaries.
http://net-square.com/httprint

hwk
Collection of packet crafting and wireless network flooding tools
http://www.nullsecurity.net/

hydra
A very fast network logon cracker which support many different services.
http://www.thc.org/thc-hydra/

hyenae
flexible platform independent packet generator
http://sourceforge.net/projects/hyenae/

hyperion
A runtime encrypter for 32-bit portable executables. 
http://nullsecurity.net/tools/binary.html

iaxflood
IAX flooder.
http://www.hackingexposedvoip.com/

icmpquery
Send and receive ICMP queries for address mask and current time.
http://www.angio.net/security/

icmptx
IP over ICMP
http://thomer.com/icmptx/

iheartxor
iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html

ikecrack
An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication
http://sourceforge.net/projects/ikecrack/

ikeprobe
Determine vulnerabilities in the PSK implementation of the VPN server.
http://www.ernw.de/download/ikeprobe.zip

ikeprober
Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors
http://ikecrack.sourceforge.net/

ike-scan
A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers
http://www.nta-monitor.com/tools/ike-scan/

inetsim
A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples
http://www.inetsim.org

inguma
A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
http://inguma.sourceforge.net

intersect
Post-exploitation framework
https://github.com/ohdae/Intersect-2.5

intrace
Traceroute-like application piggybacking on existing TCP connections
http://intrace.googlecode.com

inundator
An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
http://inundator.sourceforge.net/

iodine
Lets you tunnel IPv4 data through a DNS server.
http://code.kryo.se/iodine

ipaudit
IPAudit monitors network activity on a network.
http://ipaudit.sourceforge.net

ipba2
IOS Backup Analyzer
http://www.ipbackupanalyzer.com/

ipscan
Angry IP scanner is a very fast IP address and port scanner.
http://www.angryziber.com

irpas
Internetwork Routing Protocol Attack Suite.
http://phenoelit-us.org/irpas

isr-form
Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.
http://www.infobyte.com.ar/

javasnoop
A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer
https://code.google.com/p/javasnoop/

jboss-autopwn
A JBoss script for obtaining remote shell access
https://github.com/SpiderLabs/jboss-autopwn

jbrofuzz
Web application protocol fuzzer that emerged from the needs of penetration testing.
http://sourceforge.net/projects/jbrofuzz/

jbrute
Open Source Security tool to audit hashed passwords.
http://sourceforge.net/projects/jbrute/

jd-gui
A standalone graphical utility that displays Java source codes of .class files
http://java.decompiler.free.fr/?q

jigsaw
A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing.
https://github.com/pentestgeek/jigsaw

jnetmap
A network monitor of sorts
http://www.rakudave.ch/jnetmap/?file

johnny
GUI for John the Ripper
http://openwall.info/wiki/john/johnny

john
John The Ripper - A fast password cracker jumbo-$_jumbover included
http://www.openwall.com/$pkgname/

joomscan
Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
http://joomscan.sourceforge.net/

js-beautify
This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.
https://github.com/einars/js-beautify

jsql
A lightweight application used to find database information from a distant server.
https://code.google.com/p/jsql-injection/

jynx2
An expansion of the original Jynx LD_PRELOAD rootkit
http://www.blackhatlibrary.net/Jynx2

kautilya
Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices
http://code.google.com/p/kautilya

keimpx
Tool to verify the usefulness of credentials across a network over SMB
http://code.google.com/p/keimpx/

killerbee
Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
https://code.google.com/p/killerbee/

kippo
A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.
http://code.google.com/p/kippo/

kismet-earth
Various scripts to convert kismet logs to kml file to be used in Google Earth.
http://

klogger
A keystroke logger for the NT-series of Windows.
http://ntsecurity.nu/toolbox/klogger/

kolkata
A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.
http://www.blackhatlibrary.net/Kolkata

lanmap2
Passive network mapping tool
http://github.com/rflynn/lanmap2

lans
A Multithreaded asynchronous packet parsing/injecting arp spoofer.
https://github.com/DanMcInerney/LANs.py

laudanum
A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
http://laudanum.inguardians.com/#

lbd
Load Balancing detector
http://ge.mine.nu/code/lbd

ldapenum
Enumerate domain controllers using LDAP.
https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/

leo
Literate programmer's editor, outliner, and project manager
http://webpages.charter.net/edreamleo/front.html

leroy-jenkins
A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
https://github.com/captainhooligan/Leroy-Jenkins

lfi-autopwn
A Perl script to try to gain code execution on a remote server via LFI
http://www.blackhatlibrary.net/Lfi_autopwn.pl

lft
A layer four traceroute implementing numerous other features
http://pwhois.org/lft/

libewf
A library for support of the Expert Witness Compression Format EWF
https://code.google.com/p/libewf/

linux-exploit-suggester
A Perl script that tries to suggest exploits based OS version number
https://github.com/PenturaLabs/Linux_Exploit_Suggester

list-urls
Extracts links from webpage
http://www.whoppix.net

lodowep
Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
http://www.cqure.net/wp/lodowep/

loki
Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols
http://c0decafe.de/loki.html

lsrtunnel
lsrtunnel spoofs connections using source routed packets.
http://www.synacklabs.net/projects/lsrtunnel/

lynis
An auditing tool for Unix specialists
http://www.rootkit.nl/projects/lynis.html

magicrescue
Find and recover deleted files on block devices
http://freshmeat.net/projects/magicrescue/

magictree
A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation
http://www.gremwell.com

make-pdf
This tool will embed javascript inside a PDF document
http://blog.didierstevens.com/programs/pdf-tools/

maltego
An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
http://www.paterva.com/web5

malwaredetect
Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware
http://www.virustotal.com

maskprocessor
A High-Performance word generator with a per-position configurable charset
http://hashcat.net/wiki/doku.php?id

masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes
https://github.com/robertdavidgraham/masscan

matahari
A reverse HTTP shell to execute commands on remote machines behind firewalls.
http://matahari.sourceforge.net

mausezahn
A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
http://www.perihel.at/sec/mz/

mbenum
Queries the master browser for whatever information it has registered.
http://www.cqure.net/wp/mbenum/

mboxgrep
Mboxgrep is a small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
http://mboxgrep.sourceforge.net

md5deep
Advanced checksum hashing tool
http://md5deep.sourceforge.net

mdbtools
Utilities for viewing data and exporting schema from Microsoft Access Database files
http://sourceforge.net/projects/mdbtools/

mdcrack
MD4/MD5/NTLM1 hash cracker
http://c3rb3r.openwall.net/mdcrack/

mdk3
WLAN penetration tool
http://homepages.tu-darmstadt.de/~p_larbig/wlan/

medusa
A speedy, massively parallel, modular, login brute-forcer for network
http://www.foofus.net/jmk/medusa/medusa.html

memdump
Dumps system memory to stdout, skipping over holes in memory maps.
http://www.porcupine.org/forensics/tct.html

memfetch
dumps any userspace process memory without affecting its execution
http://lcamtuf.coredump.cx/

meshdeck
An addon to The Deck which allows multiple devices running The Deck to communicate via 802.15.4 Xbee and/or \
https://github.com/adminempire/meshdeck/

metacoretex
MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
http://metacoretex.sourceforge.net/

metagoofil
An information gathering tool designed for extracting metadata of public documents
http://www.edge-security.com/metagoofil.php

metasploit
An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits
http://www.metasploit.com

metoscan
Tool for scanning the HTTP methods supported by a webserver. It works
http://www.open-labs.org/

mfcuk
MIFARE Classic Universal toolKit
http://code.google.com/p/mfcuk/

mfoc
Mifare Classic Offline Cracker
http://code.google.com/p/mfoc/

mibble
Mibble is an open-source SNMP MIB parser or SMI parser written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
http://www.mibble.org

middler
A Man in the Middle tool to demonstrate protocol middling attacks.
http://code.google.com/p/middler/

minimysqlator
Mini MySqlat0r is a multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
http://www.scrt.ch/pages_en/minimysqlator.html

miranda-upnp
A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
http://code.google.com/p/miranda-upnp/

missidentify
A program to find Win32 applications
http://missidentify.sourceforge.net/

mitmap
Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.
http://www.darkoperator.com/tools-and-scripts/

mitmproxy
SSL-capable man-in-the-middle HTTP proxy
http://mitmproxy.org/

morxbrute
A customizable HTTP dictionary-based password cracking tool written in Perl
http://www.morxploit.com/morxbrute/

mssqlscan
A small multi-threaded tool that scans for Microsoft SQL Servers.
http://www.cqure.net/wp/mssqlscan/

ms-sys
A tool to write Win9x-.. master boot records mbr under linux - RTM!
http://ms-sys.sourceforge.net/

multiinjector
Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html

multimac
Multiple MACs on an adapter
http://sourceforge.net/projects/multimac/

nbnspoof
NBNSpoof - NetBIOS Name Service Spoofer
http://www.mcgrewsecurity.com/tools/nbnspoof/

nbtenum
A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.
http://reedarvin.thearvins.com/

nbtool
Some tools for NetBIOS and DNS investigation, attacks, and communication.
http://wiki.skullsecurity.org/Nbtool

netactview
A graphical network connections viewer for Linux similar in functionality with Netstat
http://netactview.sourceforge.net/index.html

netcommander
An easy-to-use arp spoofing tool
https://github.com/evilsocket/netcommander

netdiscover
An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
http://nixgeneration.com/~jaime/netdiscover/

netglub
The really open source information gathering tool
http://www.netglub.org

netmap
Netmap can be used to make a graphical representation of the surounding network.
http://netmap.sourceforge.net

netmask
Helps determine network masks
http://packages.qa.debian.org/n/netmask.html

netsed
Small and handful utility design to alter the contents of packets forwarded thru network in real time.
http://silicone.homelinux.org/projects/netsed/

netsniff-ng
A high performance Linux network sniffer for packet inspection.
http://netsniff-ng.org/

nfcutils
Provides a simple 'lsnfc' command that list tags which are in your NFC device field
http://code.google.com/p/nfc-tools

nfex
A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. It is based off of the code-base from the apparently defunct project tcpxtract.
https://code.google.com/p/nfex/

nfspy
A Python library for automating the falsification of NFS credentials when mounting an NFS share
https://github.com/bonsaiviking/NfSpy

nfsshell
Userland NFS command tool.
http://www.paramecium.org/~leendert/

nikto
A web server scanner which performs comprehensive tests against web servers for multiple items
http://www.cirt.net/nikto2

nipper
Network Infrastructure Parser
https://www.titania-security.com/

nishang
Using PowerShell for Penetration Testing
https://code.google.com/p/nishang/

nkiller2
A TCP exhaustion/stressing tool.
http://sock-raw.org/projects.html

nmbscan
Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.
http://nmbscan.gbarbier.org/

nomorexor
Tool to help guess a files 256 byte XOR key by using frequency analysis
https://github.com/hiddenillusion/NoMoreXOR

notspikefile
A Linux based file format fuzzing tool
http://packetstormsecurity.com/files/39627/notSPIKEfile.tgz.html

nsec3walker
Enumerates domain names using DNSSEC
http://dnscurve.org/nsec3walker.html

oat
A toolkit that could be used to audit security within Oracle database servers.
http://www.cqure.net/wp/test/

obexstress
Script for testing remote OBEX service for some potential vulnerabilities
http://bluetooth-pentest.narod.ru/

oh-my-zsh-git
A community-driven framework for managing your zsh configuration.
https://github.com/robbyrussell/oh-my-zsh

ohrwurm
A small and simple RTP fuzzer
http://mazzoo.de/

ollydbg
A 32-bit assembler-level analysing debugger
http://www.ollydbg.de

onesixtyone
An SNMP scanner that sends multiple SNMP requests to multiple IP addresses
http://labs.portcullis.co.uk/application/onesixtyone/

openvas-administrator
OpenVAS scanner administration tool
http://www.openvas.org/

openvas-client
A lightweight client. Although it is deprecated by upstream, it is still preferred by some. Please do not mark this as out-dated.
http://www.openvas.org/

openvas-cli
The OpenVAS Command-Line Interface
http://www.openvas.org/

openvas-manager
The OpenVAS Manager is a layer between the OpenVAS Scanner and various client applications
http://www.openvas.org/

openvas-scanner
The OpenVAS scanning Daemon
http://www.openvas.org/

orakelcrackert
This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm.
http://freeworld.thc.org/thc-orakelcrackert11g/

origami
A ruby framework designed to parse, analyze, and forge PDF documents.
http://security-labs.org/origami/

oscanner
An Oracle assessment framework developed in Java.
http://www.cqure.net/wp/oscanner/

owabf
Outlook Web Access bruteforcer tool.
http://netsec.rs/70/tools.html

owtf
The Offensive Web Testing Framework
https://www.owasp.org/index.php/OWASP_OWTF

p0f
Purely passive TCP/IP traffic fingerprinting tool 
http://lcamtuf.coredump.cx/p0f3/

packerid
Script which uses a PEiD database to identify which packer if any is being used by a binary.
http://handlers.sans.org/jclausing/packerid.py

packet-o-matic
A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.
http://www.packet-o-matic.org/

packit
A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.
http://packit.sourceforge.net/

pack
Password Analysis and Cracking Kit
http://thesprawl.org/projects/pack/

padbuster
Automated script for performing Padding Oracle attacks
http://www.gdssecurity.com/l/t.php

paketto
Advanced TCP/IP Toolkit.
http://www.doxpara.com/paketto

panoptic
A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability
https://github.com/lightos/Panoptic

paros
Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc.
http://www.parosproxy.org

pasco
Examines the contents of Internet Explorer's cache files for forensic purposes
http://www.jonesdykstra.com/

passcracking
A little python script for sending hashes to passcracking.com and milw0rm
http://github.com/jensp/passcracking

passivedns
A network sniffer that logs all DNS server replies for use in a passive DNS setup.
https://github.com/gamelinux/passivedns

pastenum
Search Pastebins for content, fork from nullthreat corelan pastenum2
http://github.com/shadowbq/pastenum

patator
A multi-purpose bruteforcer
http://code.google.com/p/patator/

pathod
Crafted malice for tormenting HTTP clients and servers
http://pathod.net/

paxtest
PaX regression test suite.
http://pax.grsecurity.net/

pblind
Little utility to help exploiting blind sql injection vulnerabilities.
http://www.edge-security.com/pblind.php

pcapsipdump
pcapsipdump is a tool for dumping SIP sessions +RTP traffic, if available to disk in a fashion similar to 'tcpdump -w' format is exactly the same, but one file per sip session even if there is thousands of concurrect SIP sessions.
http://pcapsipdump.sourceforge.net/

pdfcrack
Password recovery tool for PDF-files.
http://pdfcrack.sourceforge.net/

pdfid
scan a file to look for certain PDF keywords
http://blog.didierstevens.com/programs/pdf-tools/

pdf-parser
Parses a PDF document to identify the fundamental elements used in the analyzed file
http://blog.didierstevens.com/programs/pdf-tools/

pdgmail
A password dictionary attack tool that targets windows authentication via the SMB protocol
http://www.jeffbryner.com/code/pdgmail

peach
A SmartFuzzer that is capable of performing both generation and mutation based fuzzing
http://peachfuzzer.com/

peepdf
A Python tool to explore PDF files in order to find out if the file can be harmful or not
http://code.google.com/p/peepdf/

pentbox
A security suite that packs security and stability testing oriented tools for networks and systems
http://www.pentbox.net

perl-tftp
TFTP - TFTP Client class for perl
http://search.cpan.org/~gsm/TFTP/TFTP.pm

pev
Command line based tool for PE32/PE32+ file analysis
http://pev.sourceforge.net/

phoss
Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.
http://www.phenoelit.org/fr/tools.html

php-mt-seed
PHP mt_rand seed cracker
http://www.openwall.com/php_mt_seed/

phrasendrescher
A modular and multi processing pass phrase cracking tool
http://www.leidecker.info/projects/phrasendrescher/

pipal
A password analyser
http://www.digininja.org/projects/pipal.php

pirana
Exploitation framework that tests the security of a email content filter.
http://www.guay-leroux.com/projects.html

plecost
WordPress finger printer tool search and retrieve information about the plugins versions installed in WordPress systems.
http://code.google.com/p/plecost/

pnscan
A parallel network scanner that can be used to survey TCP network services.
http://www.lysator.liu.se/~pen/pnscan/

powerfuzzer
Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer. It can detect XSS, Injections SQL, LDAP, commands, code, XPATH and others.
http://www.powerfuzzer.com

powersploit
A PowerShell Post-Exploitation Framework
https://github.com/mattifestation/PowerSploit

propecia
A fast class scanner that scans for a specified open port with banner grabbing
http://www.redlevel.org

pscan
A limited problem scanner for C source files
http://deployingradius.com/pscan/

pstoreview
Lists the contents of the Protected Storage.
http://www.ntsecurity.nu/toolbox/pstoreview/

ptunnel
A tool for reliably tunneling TCP connections over ICMP echo request and reply packets
http://www.cs.uit.no/~daniels/PingTunnel/#download

pwdump
Extracts the binary SAM and SYSTEM file from the filesystem and then
http://www.tarasco.org/security/pwdump_7/index.html

pwnat
A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other
http://samy.pl/pwnat/

pyinstaller
A program that converts packages Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX.
http://www.pyinstaller.org/

pyminifakedns
Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record
http://code.activestate.com/recipes/491264/

pyrit
WPA/WPA2-PSK attacking with gpu and cluster
http://code.google.com/p/pyrit

pytacle
Automates the task of sniffing GSM frames
http://packetstormsecurity.com/files/124299/pytacle-alpha2.tar.gz

python2-yara
A malware identification and classification tool
https://github.com/plusvic/yara

python-utidylib
Python bindings for Tidy HTML parser/cleaner.
http://utidylib.berlios.de

radamsa
General purpose data fuzzer.
https://code.google.com/p/ouspg/wiki/Radamsa

radare2
Open-source tools to disasm, debug, analyze and manipulate binary files
http://radare.org

rainbowcrack
Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches
http://project-rainbowcrack.com/

rarcrack
This program uses bruteforce algorithm to find correct password rar, 7z, zip
http://rarcrack.sourceforge.net/

ratproxy
A passive web application security assessment tool
http://code.google.com/p/ratproxy/

rawr
Rapid Assessment of Web Resources. A web enumerator.
https://bitbucket.org/al14s/rawr/wiki/Home

rcracki-mt
A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com
http://rcracki.sourceforge.net/

rdesktop-brute
It connects to windows terminal servers - Bruteforce patch included.
http://www.rdesktop.org/

reaver
Implements a brute force attack against wifi protected setup WPS registrar PINs in order to recover WPA/WPA2 passphrases
http://code.google.com/p/reaver-wps

rebind
DNS Rebinding Tool
http://code.google.com/p/rebind/

recon-ng
A full-featured Web Reconnaissance framework written in Python.
https://bitbucket.org/LaNMaSteR53/recon-ng

recoverjpeg
Recover jpegs from damaged devices
http://www.rfc1149.net/devel/recoverjpeg

recstudio
Cross platform interactive decompiler
http://www.backerstreet.com/rec/rec.htm

redfang
Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name.
http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html

redirectpoison
A tool to poison a targeted issuer of SIP INVITE requests with 301 i.e. Moved Permanently redirection responses.
http://www.hackingexposedvoip.com/

reglookup
Command line utility for reading and querying Windows NT registries
http://projects.sentinelchicken.org/reglookup

relay-scanner
SMTP relay scanner
http://www.cirt.dk

responder
A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
https://github.com/SpiderLabs/Responder

rfcat
RF ChipCon-based Attack Toolset
http://code.google.com/p/rfcat

rfdump
A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible
http://www.rfdump.org

rfidiot
An open source python library for exploring RFID devices.
http://rfidiot.org

rfidtool
A opensource tool to read / write rfid tags
http://www.bindshell.net/tools/rfidtool.html

rifiuti2
A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file.
https://code.google.com/p/rifiuti2/

ripdc
A script which maps domains related to an given ip address or domainname.
http://nullsecurity.net/tools/scanner

rootbrute
Local root bruteforcer.
http://www.packetstormsecurity.org/

ropeadope
A linux log cleaner.
http://www.highhacksociety.com/

ropeme
ROPME is a set of python scripts to generate ROP gadgets and payload.
http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/

ropgadget
Lets you search your gadgets on your binaries ELF format to facilitate your ROP exploitation.
https://github.com/JonathanSalwan/ROPgadget

rrs
A reverse connecting remote shell. Instead of listening for incoming connections it will connect out to a listener rrs in listen mode. With tty support and more.
http://www.cycom.se/dl/rrs

rsakeyfind
A tool to find RSA key in RAM.
http://citp.princeton.edu/memory/code/

rsmangler
rsmangler takes a wordlist and mangle it
http://www.randomstorm.com/rsmangler-security-tool.php

rtpbreak
Detects, reconstructs and analyzes any RTP session
http://xenion.antifork.org/rtpbreak/

rtp-flood
RTP flooder
http://www.hackingexposedvoip.com/

rubilyn
64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host.
http://nullsecurity.net/tools/backdoor.html

ruby-ronin
A Ruby platform for exploit development and security research.
http://ronin-ruby.github.io/

ruby-ronin-support
A support library for Ronin.
http://ronin-ruby.github.io/

rww-attack
The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out.
http://packetstormsecurity.com/files/79021/Remote-Web-Workplace-Attack-Tool.html

safecopy
A disk data recovery tool to extract data from damaged media
http://safecopy.sourceforge.net/

sakis3g
An all-in-one script for connecting with 3G
http://www.sakis3g.org/

samdump2
Dump password hashes from a Windows NT/2k/XP installation
http://sourceforge.net/projects/ophcrack/files/samdump2/

samydeluxe
Automatic samdump creation script.
http://github.com/jensp/samydeluxe

sbd
Netcat-clone, portable, offers strong encryption - features AES-128-CBC + HMAC-SHA1 encryption, program execution -e, choosing source port, continuous reconnection with delay + more
http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue

scalpel
A frugal, high performance file carver
http://www.digitalforensicssolutions.com/Scalpel/

scanmem
A utility used to locate the address of a variable in an executing process.
http://code.google.com/p/scanmem/

scanssh
Fast SSH server and open proxy scanner.
http://www.monkey.org/~provos/scanssh/

scapy
A powerful interactive packet manipulation program written in Python
http://www.secdev.org/projects/scapy/

schnappi-dhcp
schnappi can fuck network with no DHCP
http://www.emanuelegentili.eu/

scrounge-ntfs
Data recovery program for NTFS file systems
http://memberwebs.com/stef/software/scrounge/

sctpscan
A network scanner for discovery and security
http://www.p1sec.com/

secure-delete
Secure file, disk, swap, memory erasure utilities
http://www.thc.org/

sergio-proxy
A multi-threaded transparent HTTP proxy for manipulating web traffic
https://github.com/darkoperator/dnsrecon

sessionlist
Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth.
http://www.0xrage.com/

set
Social-engineer toolkit. Aimed at penetration testing around Social-Engineering
https://www.trustedsec.com/downloads/social-engineer-toolkit

sfuzz
Simple Fuzzer is a simple fuzzer
http://aconole.brad-x.com/programs/sfuzz.html

shellcodecs
A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.
http://www.blackhatlibrary.net/Shellcodecs

shellnoob
A toolkit that eases the writing and debugging of shellcode
https://github.com/reyammer/shellnoob

sidguesser
Guesses sids/instances against an Oracle database according to a predefined dictionary file.
http://www.cqure.net/wp/tools/database/sidguesser/

simple-ducky
A payload generator
https://code.google.com/p/simple-ducky-payload-generator

sinfp
A full operating system stack fingerprinting suite.
http://www.networecon.com/tools/sinfp/

siparmyknife
A small command line tool for developers and administrators of Session Initiation Protocol SIP applications.
http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt

sipcrack
A SIP protocol login cracker.
http://www.remote-exploit.org/codes_sipcrack.html

sipp
A free Open Source test tool / traffic generator for the SIP protocol.
http://sipp.sourceforge.net/

sipsak
A small command line tool for developers and administrators of Session Initiation Protocol SIP applications.
http://sipsak.org

sipscan
A sip scanner.
http://www.hackingvoip.com/sec_tools.html

sipvicious
Tools for auditing SIP devices
http://blog.sipvicious.org

skipfish
A fully automated, active web application security reconnaissance tool
http://code.google.com/p/skipfish/

skyjack
Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control
https://github.com/samyk/skyjack

slowhttptest
A highly configurable tool that simulates application layer denial of service attacks
http://code.google.com/p/slowhttptest

smali
An assembler/disassembler for Android's dex format
http://code.google.com/p/smali/

smbbf
SMB password bruteforcer.
http://packetstormsecurity.com/files/25381/smbbf-0.9.1.tar.gz.html

smbrelay
SMB / HTTP to SMB replay attack toolkit.
http://www.tarasco.org/security/smbrelay/

smtp-fuzz
Simple smtp fuzzer
none

smtpmap
Tool to identify the running smtp software on a given host.
http://www.projectiwear.org/~plasmahh/software.html

smtpscan
An SMTP scanner
http://packetstormsecurity.com/files/31102/smtpscan-$pkgver.tar.gz.html

smtp-user-enum
Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum

smtp-vrfy
An SMTP Protocol Hacker.

sniffjoke
Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft
http://www.delirandom.net/sniffjoke/

snmpcheck
A free open source utility to get information via SNMP protocols.
http://www.nothink.org/perl/snmpcheck/

snmpenum
snmp enumerator
http://www.filip.waeytens.easynet.be/

snmpscan
A free, multi-processes SNMP scanner
http://www.nothink.org/perl/snmpscan/index.php

snscan
A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.
http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx

spade
A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.
http://www.hoobie.net/brutus/

spectools
Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.
http://www.kismetwireless.net/spectools/

spiderfoot
The Open Source Footprinting Tool
http://spiderfoot.net

spiderpig-pdffuzzer
A javascript pdf fuzzer
https://code.google.com/p/spiderpig-pdffuzzer/

spike
IMMUNITYsec's fuzzer creation kit in C
http://www.immunitysec.com/resources-freesoftware.shtml

spike-proxy
A Proxy for detecting vulnerabilities in web applications
http://www.immunitysec.com/resources-freesoftware.shtml

sploitctl
Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
https://github.com/BlackArch/sploitctl

sploitego
Maltego Penetration Testing Transforms
https://github.com/allfro/sploitego

spooftooph
Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight
http://www.hackfromacave.com/projects/spooftooph.html

sqid
A SQL injection digger.
http://sqid.rubyforge.org/

sqlbrute
Brute forces data out of databases using blind SQL injection.
http://www.justinclarke.com/archives/2006/03/sqlbrute.html

sqlmap
An automatic SQL injection tool developed in Python
http://sqlmap.sourceforge.net

sqlninja
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end
http://sqlninja.sourceforge.net/

sqlpat
This tool should be used to audit the strength of Microsoft SQL Server passwords offline.
http://www.cqure.net/wp/sqlpat/

sqlping
SQL Server scanning tool that also checks for weak passwords using wordlists.
http://www.sqlsecurity.com/downloads

sqlsus
An open source MySQL injection and takeover tool, written in perl
http://sqlsus.sourceforge.net/

sshatter
Password bruteforcer for SSH
http://www.nth-dimension.org.uk/downloads.php?id

ssh-privkey-crack
A SSH private key cracker
https://code.google.com/p/lusas/

sshtrix
A very fast multithreaded SSH login cracker
http://nullsecurity.net/tools/cracker.html

sslcat
SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
http://www.bindshell.net/tools/sslcat

sslcaudit
Utility to perform security audits of SSL/TLS clients
https://github.com/grwl/sslcaudit

ssldump
an SSLv3/TLS network protocol analyzer
http://www.rtfm.com/ssldump/

sslnuke
Transparent proxy that decrypts SSL traffic and prints out IRC messages.
https://github.com/jtripper/sslnuke

sslscan
A fast tools to scan SSL services, such as HTTPS.
http://sourceforge.net/projects/sslscan/

sslsniff
A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly
http://www.thoughtcrime.org/software/sslsniff/

sslstrip
Transparently hijack http traffic on a network, watch for https links and redirects, then map those links
http://www.thoughtcrime.org/software/sslstrip

sslyze
Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations
https://github.com/iSECPartners/sslyze

statsprocessor
A high-performance word-generator based on per-position Markov-attack
http://hashcat.net/wiki/doku.php?id

stompy
an advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.
http://lcamtuf.coredump.cx/

subdomainer
A tool designed for obtaining subdomain names from public sources.
http://www.edge-security.com/subdomainer.php

subterfuge
Automated Man-in-the-Middle Attack Framework
http://kinozoa.com

sucrack
A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su
http://labs.portcullis.co.uk/application/sucrack

sulley
A pure-python fully automated and unattended fuzzing framework
https://github.com/OpenRCE/sulley/

superscan
Powerful TCP port scanner, pinger, resolver.
http://www.foundstone.com/us/resources/proddesc/superscan.htm

swfintruder
First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.
http://code.google.com/p/swfintruder/

synscan
fast asynchronous half-open TCP portscanner
http://www.digit-labs.org/files/tools/synscan/

sysinternals-suite
Sysinternals tools suite
http://sysinternals.com

t50
Experimental Multi-protocol Packet Injector Tool
http://t50.sourceforge.net/

taof
Taof is a GUI cross-platform Python generic network protocol fuzzer.
http://taof.sf.net

tbear
Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner a bit similar to kismet, a Bluetooth DoS tool, and a Bluetooth hidden device locator.
http://freshmeat.net/projects/t-bear

tcpcontrol-fuzzer
2^6 TCP control bit fuzzer no ECN or CWR.
https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer

tcpextract
Extracts files from captured TCP sessions. Support live streams and pcap files.
https://pypi.python.org/pypi/tcpextract/1.1

tcpick
TCP stream sniffer and connection tracker
http://tcpick.sourceforge.net/

tcpjunk
A general tcp protocols testing and hacking utility
http://code.google.com/p/tcpjunk

tcptraceroute
A traceroute implementation using TCP packets.
http://michael.toren.net/code/tcptraceroute/

tcpxtract
tcpxtract is a tool for extracting files from network traffic
http://tcpxtract.sourceforge.net

teardown
Command line tool to send a BYE request to tear down a call.
http://www.hackingexposedvoip.com/

termineter
Smart meter testing framework
https://code.google.com/p/termineter/

tftp-bruteforce
TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.
http://www.hackingexposedcisco.com/

tftp-fuzz
Master TFTP fuzzing script as part of the ftools series of fuzzers
http://nullsecurity.net/tools/fuzzer.html

thc-ipv6
A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.
http://thc.org/thc-ipv6/

thc-pptp-bruter
pptp-bruter is a brute force program that works against pptp vpn endpoints tcp port 1723.
http://www.thc.org

thc-ssl-dos
A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!
http://www.thc.org/thc-ssl-dos/

theharvester
Python tool for gathering e-mail accounts and subdomain names from different public sources search engines, pgp key servers
http://www.edge-security.com/theHarvester.php

tiger
A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
http://www.nongnu.org/tiger/

tlssled
A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS HTTPS web server implementation.
http://blog.taddong.com/2011/05/tlssled-v10.html

tnscmd
a lame tool to prod the oracle tnslsnr process 1521/tcp
http://www.jammed.com/~jwa/hacks/security/tnscmd/

tor-autocircuit
Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
http://www.thesprawl.org/projects/tor-autocircuit/

tpcat
TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures taken on each side of the firewall as an example and report any packets that were seen on the source capture but didn’t make it to the dest.
http://sourceforge.net/projects/tpcat/

trixd00r
An advanced and invisible userland backdoor based on TCP/IP for UNIX systems
http://nullsecurity.net/tools/backdoor.html

truecrack
Password cracking for truecryptc volumes.
http://code.google.com/p/truecrack/

tsh
An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.
http://packetstormsecurity.com/search/?q

tuxcut
Netcut-like program for Linux written in PyQt
http://bitbucket.org/a_atalla/tuxcut/

twofi
Twitter Words of Interest
http://www.digininja.org/projects/twofi.php

u3-pwn
A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install
http://www.nullsecurity.net/tools/backdoor.html

uatester
User Agent String Tester
http://code.google.com/p/ua-tester/

ubertooth
A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only
http://sourceforge.net/projects/ubertooth/

udis86
A minimalistic disassembler library
http://udis86.sourceforge.net/

udptunnel
Tunnels TCP over UDP packets.
http://code.google.com/p/udptunnel/

ufo-wardriving
Allows you to test the security of wireless networks by detecting their passwords based on the router model
http://www.ufo-wardriving.com/

unicornscan
A new information gathering and correlation engine.
http://www.unicornscan.org/

uniofuzz
The universal fuzzing tool for browsers, web services, files, programs and network services/ports
http://nullsecurity.net/tools/fuzzer.html

uniscan
A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
http://sourceforge.net/projects/uniscan/

unix-privesc-check
Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps e.g. databases
http://pentestmonkey.net/tools/audit/unix-privesc-check

unsecure
Bruteforces network login masks.
http://www.sniperx.net/

upnpscan
Scans the LAN or a given address range for UPnP capable devices.
http://www.cqure.net/wp/upnpscan/

urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
http://www.morningstarsecurity.com/research/urlcrazy

username-anarchy
Tools for generating usernames when penetration testing
http://www.morningstarsecurity.com/research/username-anarchy

vega
An open source platform to test the security of web applications
https://github.com/subgraph/Vega/wiki

veil
A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
https://github.com/veil-evasion/Veil

vfeed
Open Source Cross Linked and Aggregated Local Vulnerability Database main repository
http://www.toolswatch.org/vfeed

videosnarf
A new security assessment tool for pcap analysis
http://ucsniff.sourceforge.net/videosnarf.html

vinetto
A forensics tool to examine Thumbs.db files
http://vinetto.sourceforge.net

viproy-voipkit
VIPROY - VoIP Pen-Test Kit for Metasploit Framework
http://viproy.com/

vivisect
Vivisect is a Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto
http://visi.kenshoto.com/

vnak
Aim is to be the one tool a user needs to attack multiple VoIP protocols.
https://www.isecpartners.com/vnak.html

vnc-bypauth
Multi-threaded bypass authentication scanner for VNC servers <
http://pentester.fr/resources/tools/techno/VNC/VNC_bypauth/

vncrack
What it looks like: crack VNC.
http://phenoelit-us.org/vncrack

voiper
A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.
http://voiper.sourceforge.net/

voiphopper
A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
http://voiphopper.sourceforge.net/

voipong
A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.
http://www.enderunix.org/voipong/

volatility
A memory forensics toolkit
https://www.volatilesystems.com/default/volatility

vulscan
A collection of NSE scripts to turn Nmap into a vuln scanner
http://www.computec.ch/projekte/vulscan/?

w3af
Web Application Attack and Audit Framework
http://w3af.sourceforge.net/

waffit
A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website
http://code.google.com/p/waffit/

wapiti
A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...
http://wapiti.sourceforge.net/

webacoo
Web Backdoor Cookie Script-Kit
https://bechtsoudis.com/webacoo/

webenum
Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.
http://code.google.com/p/webenum/

webhandler
A handler for PHP system functions & also an alternative 'netcat' handler.
https://github.com/lnxg33k/webhandler

webrute
Web server directory brute forcer.
https://github.com/BlackArch/webrute

webscarab
Framework for analysing applications that communicate using the HTTP and HTTPS protocols
http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project

webshag
A multi-threaded, multi-platform web server audit tool.
http://www.scrt.ch/en/attack/downloads/webshag

webshells
Web Backdoors
https://github.com/BlackArch/webshells

webslayer
A tool designed for brute forcing Web Applications
https://code.google.com/p/webslayer/

websploit
An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks
http://code.google.com/p/websploit/

weevely
Stealth tiny web shell
http://epinna.github.io/Weevely/

wepbuster
script for automating aircrack-ng
http://code.google.com/p/wepbuster/

wfuzz
Utility to bruteforce web applications to find their not linked resources
http://code.google.com/p/wfuzz

whatweb
Next generation web scanner that identifies what websites are running.
http://www.morningstarsecurity.com/research/whatweb

wiffy
An Automated wifi hacking script
https://code.google.com/p/g0tmi1k/

wifi-honey
A management tool for wifi honeypots
http://www.digininja.org/projects/wifi_honey.php

wifi-monitor
Prints the IPs on your local network that're sending the most packets
https://github.com/DanMcInerney/wifi-monitor

wifitap
WiFi injection tool through tun/tap device
https://github.com/GDSSecurity/wifitap

wifite
A tool to attack multiple WEP and WPA encrypted networks at the same time
http://code.google.com/p/wifite/

winexe
Remotely execute commands on Windows NT/2000/XP/2003 systems.
http://sourceforge.net/projects/winexe/

winfo
Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares also hidden, sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.
http://www.ntsecurity.nu/toolbox/winfo/

wlan2eth
re-writes 802.11 captures into standard Ethernet frames.
http://www.willhackforsushi.com/?page_id

wmat
Automatic tool for testing webmail accounts
http://netsec.rs/70/tools.html

wnmap
A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.
http://nullsecurity.net/tools/automation.html

wol-e
A suite of tools for the Wake on LAN feature of network attached computers
http://code.google.com/p/wol-e/

wpscan
A vulnerability scanner which checks the security of WordPress installations using a black box approach
http://wpscan.org

wsfuzzer
A Python tool written to automate SOAP pentesting of web services
https://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project

wyd
Gets keywords from personal files. IT security/forensic tool.
http://www.remote-exploit.org/?page_id

xorbruteforcer
Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.
http://eternal-todo.com/category/bruteforce

xorsearch
Program to search for a given string in an XOR, ROL or ROT encoded binary file.
http://blog.didierstevens.com/programs/xorsearch/

xortool
A tool to analyze multi-byte xor cipher.
https://github.com/hellman/xortool/

xprobe2
An active OS fingerprinting tool
http://sourceforge.net/apps/mediawiki/xprobe/index.php?title

x-scan
A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.
http://www.xfocus.org/

xspy
A utility for monitoring keypresses on remote X servers
http://www.freshports.org/security/xspy/

xsser
A penetration testing tool for detecting and exploiting XSS vulnerabilites.
http://xsser.sourceforge.net/

xsss
xsss is a brute force cross site scripting scanner
http://www.sven.de/xsss/

yara
A malware identification and classification tool
http://code.google.com/p/yara-project/

yersinia
A network tool designed to take advantage of some weakness in different network protocols
http://www.yersinia.net/

zaproxy
An integrated penetration testing tool for finding vulnerabilities in web applications
http://code.google.com/p/zaproxy/

zarp
A network attack tool centered around the exploitation of local networks.
https://defense.ballastsecurity.net/wiki/index.php/Zarp

zerowine
Malware Analysis Tool - research project to dynamically analyze the behavior of malware
http://zerowine.sf.net/

zmap
Fast network scanner designed for Internet-wide network surveys
https://zmap.io/

zulu
Zulu is a light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.
http://sourceforge.net/projects/zulu-wireless/

zzuf
Transparent application input fuzzer.
http://sam.zoy.org/zzuf/

给我留言

留言无头像?