Top 20 Most Popular Hacking Tools in 2018 Top 20 Most Popular Hacking Tools in 2018 Reviewed by Anonymous on 4:20 AM Rating: 5
Smap - Shellcode Mapper Smap - Shellcode Mapper Reviewed by Anonymous on 12:18 PM Rating: 5
Infoga - Email OSINT Infoga - Email OSINT Reviewed by Anonymous on 4:36 AM Rating: 5
ThunderDNS - Tool To Forward TCP Traffic Over DNS Protocol ThunderDNS - Tool To Forward TCP Traffic Over DNS Protocol Reviewed by Anonymous on 12:41 PM Rating: 5
Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files Reviewed by Anonymous on 4:27 AM Rating: 5
stoQ - An Open Source Framework For Enterprise Level Automated Analysis stoQ - An Open Source Framework For Enterprise Level Automated Analysis Reviewed by Anonymous on 12:24 PM Rating: 5
Pocsuite v2.0.8 - Remote Vulnerability Testing Framework Developed By The Knownsec Security Team Pocsuite v2.0.8 - Remote Vulnerability Testing Framework Developed By The Knownsec Security Team Reviewed by Anonymous on 4:40 AM Rating: 5
PA Toolkit - A Collection Of Traffic Analysis Plugins Focused On Security PA Toolkit - A Collection Of Traffic Analysis Plugins Focused On Security Reviewed by Anonymous on 12:35 PM Rating: 5
SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API Reviewed by Anonymous on 4:54 AM Rating: 5
Hatch - Tool To Brute Force Most Websites Hatch - Tool To Brute Force Most Websites Reviewed by Anonymous on 12:54 PM Rating: 5
Serial Swatter and Stalker Mir Islam Arrested for Allegedly Dumping Body in River Serial Swatter and Stalker Mir Islam Arrested for Allegedly Dumping Body in River Reviewed by Anonymous on 12:39 PM Rating: 5
BruteX v1.9 - Automatically Brute Force All Services Running On A Target BruteX v1.9 - Automatically Brute Force All Services Running On A Target Reviewed by Anonymous on 4:48 AM Rating: 5
nodeCrypto - Ransomware Written In NodeJs nodeCrypto - Ransomware Written In NodeJs Reviewed by Anonymous on 12:52 PM Rating: 5
SharpWeb - .NET 2.0 CLR Project To Retrieve Saved Browser Credentials From Google Chrome, Mozilla Firefox And Microsoft Internet Explorer/Edge SharpWeb - .NET 2.0 CLR Project To Retrieve Saved Browser Credentials From Google Chrome, Mozilla Firefox And Microsoft Internet Explorer/Edge Reviewed by Anonymous on 5:18 AM Rating: 5
Ustealer - Ubuntu Stealer, Steal Ubuntu Information In Local PC Ustealer - Ubuntu Stealer, Steal Ubuntu Information In Local PC Reviewed by Anonymous on 1:04 PM Rating: 5
W3Brute - Automatic Web Application Brute Force Attack Tool W3Brute - Automatic Web Application Brute Force Attack Tool Reviewed by Anonymous on 4:34 AM Rating: 5
FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged FBI Seizes 15 DDoS-For-Hire Websites, 3 Operators Charged Reviewed by Anonymous on 12:53 AM Rating: 5
US Indicts Two Chinese Government Hackers Over Global Hacking Campaign US Indicts Two Chinese Government Hackers Over Global Hacking Campaign Reviewed by Anonymous on 11:48 PM Rating: 5
Doppelganger - Python Script To Scan Duplicate Copies In A Given Directory Doppelganger - Python Script To Scan Duplicate Copies In A Given Directory Reviewed by Anonymous on 12:31 PM Rating: 5
Feds Charge Three in Mass Seizure of Attack-for-hire Services Feds Charge Three in Mass Seizure of Attack-for-hire Services Reviewed by Anonymous on 11:26 AM Rating: 5
Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter Reviewed by Anonymous on 7:54 AM Rating: 5
IP Obfuscator - Simple Tool To Convert An IP Into Integer, Hexadecimal Or Octal Form IP Obfuscator - Simple Tool To Convert An IP Into Integer, Hexadecimal Or Octal Form Reviewed by Anonymous on 4:14 AM Rating: 5
Microsoft Issues Emergency Patch For Under-Attack IE Zero Day Microsoft Issues Emergency Patch For Under-Attack IE Zero Day Reviewed by Anonymous on 11:52 PM Rating: 5
Wordlistctl - Fetch, Install And Search Wordlist Archives From Websites And Torrent Peers Wordlistctl - Fetch, Install And Search Wordlist Archives From Websites And Torrent Peers Reviewed by Anonymous on 1:27 PM Rating: 5
Microsoft Issues Emergency Fix for IE Zero Day Microsoft Issues Emergency Fix for IE Zero Day Reviewed by Anonymous on 1:12 PM Rating: 5
Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Most Frequently Used Files And Folders As Well As "Interesting" Files Containing Sensitive Information Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Most Frequently Used Files And Folders As Well As "Interesting" Files Containing Sensitive Information Reviewed by Anonymous on 4:39 AM Rating: 5
Mayday! NASA Warns Employees of Personal Information Breach Mayday! NASA Warns Employees of Personal Information Breach Reviewed by Anonymous on 12:52 AM Rating: 5
A Chief Security Concern for Executive Teams A Chief Security Concern for Executive Teams Reviewed by Anonymous on 1:50 PM Rating: 5
pyHAWK - Searches The Directory Of Choice For Interesting Files. Such As Database Files And Files With Passwords Stored On Them pyHAWK - Searches The Directory Of Choice For Interesting Files. Such As Database Files And Files With Passwords Stored On Them Reviewed by Anonymous on 1:15 PM Rating: 5
Hashie - Crack Hashes In A Blink Of An Eye Hashie - Crack Hashes In A Blink Of An Eye Reviewed by Anonymous on 6:33 AM Rating: 5
New Malware Takes Commands From Memes Posted On Twitter New Malware Takes Commands From Memes Posted On Twitter Reviewed by Anonymous on 1:59 AM Rating: 5
Deep Explorer - Tool Which Purpose Is The Search Of Hidden Services In Tor Network, Using Ahmia Browser And Crawling The Links Obtained Deep Explorer - Tool Which Purpose Is The Search Of Hidden Services In Tor Network, Using Ahmia Browser And Crawling The Links Obtained Reviewed by Anonymous on 12:54 PM Rating: 5
R3Con1Z3R - A Lightweight Web Information Gathering Tool With An Intuitive Features (OSINT) R3Con1Z3R - A Lightweight Web Information Gathering Tool With An Intuitive Features (OSINT) Reviewed by Anonymous on 4:16 AM Rating: 5
Punk.Py - Unix SSH Post-Exploitation Tool Punk.Py - Unix SSH Post-Exploitation  Tool Reviewed by Anonymous on 1:29 PM Rating: 5
LDAP_Search - Tool To Perform LDAP Queries And Enumerate Users, Groups, And Computers From Windows Domains LDAP_Search - Tool To Perform LDAP Queries And Enumerate Users, Groups, And Computers From Windows Domains Reviewed by Anonymous on 4:35 AM Rating: 5
ZIP Shotgun - Utility Script To Test Zip File Upload Functionality (And Possible Extraction Of Zip Files) For Vulnerabilities ZIP Shotgun - Utility Script To Test Zip File Upload Functionality (And Possible Extraction Of Zip Files) For Vulnerabilities Reviewed by Anonymous on 1:56 PM Rating: 5
imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware Reviewed by Anonymous on 4:14 AM Rating: 5
Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers Reviewed by Anonymous on 10:10 PM Rating: 5
Aircrack-ng 1.5 - Complete Suite Of Tools To Assess WiFi Network Security Aircrack-ng 1.5 - Complete Suite Of Tools To Assess WiFi Network Security Reviewed by Anonymous on 1:10 PM Rating: 5
New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps Reviewed by Anonymous on 9:58 AM Rating: 5
New Shamoon Malware Variant Targets Italian Oil and Gas Company New Shamoon Malware Variant Targets Italian Oil and Gas Company Reviewed by Anonymous on 8:14 AM Rating: 5
Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada Reviewed by Anonymous on 4:59 AM Rating: 5
NETworkManager - A Powerful Tool For Managing Networks And Troubleshoot Network Problems! NETworkManager - A Powerful Tool For Managing Networks And Troubleshoot Network Problems! Reviewed by Anonymous on 4:15 AM Rating: 5
Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Anonymous on 1:10 PM Rating: 5
Spammed Bomb Threat Hoax Demands Bitcoin Spammed Bomb Threat Hoax Demands Bitcoin Reviewed by Anonymous on 12:55 PM Rating: 5
Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner Reviewed by Anonymous on 3:39 AM Rating: 5
Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems Reviewed by Anonymous on 1:57 PM Rating: 5
Scanning for Flaws, Scoring for Security Scanning for Flaws, Scoring for Security Reviewed by Anonymous on 1:51 PM Rating: 5
SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool Reviewed by Anonymous on 3:46 AM Rating: 5
Adobe's Year-End Update Patches 87 Flaws in Acrobat Software Adobe's Year-End Update Patches 87 Flaws in Acrobat Software Reviewed by Anonymous on 2:42 AM Rating: 5
Microsoft Issues Patch for Windows Zero-Day Flaw Under Active Attack Microsoft Issues Patch for Windows Zero-Day Flaw Under Active Attack Reviewed by Anonymous on 12:54 AM Rating: 5