Suricata (IDS/IPS Engine) :: Tools
Suricata (IDS/IPS Engine) :: Tools The Suricata Engine is an Open Source Next Generation Intrusion…
Suricata (IDS/IPS Engine) :: Tools The Suricata Engine is an Open Source Next Generation Intrusion…
Polipo (Fast Caching Web Proxy) :: Tools Polipo is a small and fast caching web proxy (a web cache,…
Echo Mirage 3.1 :: Tools Echo Mirage is a generic network proxy. It uses DLL injection and functio…
iPhone Analyzer :: Tools iPhone Analzyer allows you to forensically examine or recover date from i…
CSRFTester (CSRF Vulnerability Tester) :: Tools OWASP CSRFTester is a tool for testing CSRF vulner…
SILICA (WiFi Penetration Testing) :: Tools SILICA is a tool for hacking or Wi-Fi penetration testin…
Nemesis (Network Packet Cracking and Injection) :: Tools Nemesis is a command-line network packet c…
FARADAY (Integrated Penetration Testing IDE) :: Framework Faraday introduces a new concept (IPE) In…
BackTrack 5 R3 :: Distribution BackTrack is a most usable or power distribution based on the Ubuntu…
Kali Linux :: HackerHub Kali Linux is a newer version of BackTrack with additional tools. Kali Lin…
SpiderFoot (Open Source Footprinting) :: Tools SpiderFoot is a free, open-source footprinting tool …
FCrackZip (Zip Password Cracking) :: Tools FCrackZip is a zip password cracking tool. Naturally, pr…
SIPVicious (Auditing SIP Based VoIP System) :: Tools SVMAP is a part of a suite of tools called SIP…
Creepy (A Geolocation OSINT Tool) :: Tools Creepy is an open-source Geolocation intelligence tool. …
Juli (MITM) A simple automated perl script for MiTM ( man-in-the-middle ) attacks. Requirements: Li…
Raptor (Web Application Firewall) Raptor is an Open Source Tool, your focus is study of attacks and…
Capstone (Disassembly Framework) Capstone is a lightweight multi-platform, multi-architecture disas…
PatrowlHears (Vulnerability Intelligence Center) PatrowlHears provides a unified source of vulnerab…