Files
.github/packages.json
Eshan Roy c4e552d5c4
Some checks failed
Check Conventional Commit / check-commit-message (push) Has been cancelled
Create packages.json
2025-02-27 08:29:49 +05:30

46528 lines
1.3 MiB

{
"0d1n": {
"version": "1:263.2d723ae-2",
"description": "Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.",
"dependencies": [
"curl"
]
},
"0d1n-debug": {
"version": "1:263.2d723ae-2",
"description": "Detached debugging symbols for 0d1n",
"dependencies": []
},
"0trace": {
"version": "1.5-7",
"description": "A hop enumeration tool.",
"dependencies": [
"python2-dpkt",
"python2-pypcap",
"python2-pydnet",
"libdnet",
"python2-setuptools"
]
},
"3proxy": {
"version": "0.9.4-2",
"description": "Tiny free proxy server.",
"dependencies": [
"openssl"
]
},
"3proxy-debug": {
"version": "0.9.4-2",
"description": "Detached debugging symbols for 3proxy",
"dependencies": []
},
"3proxy-win32": {
"version": "0.8.13-1",
"description": "Tiny free proxy server.",
"dependencies": []
},
"42zip": {
"version": "1:42-3",
"description": "Recursive Zip archive bomb.",
"dependencies": []
},
"a2sv": {
"version": "140.cb24c4e-3",
"description": "Auto Scanning to SSL Vulnerability.",
"dependencies": [
"python2",
"python2-netaddr",
"openssl"
]
},
"abcd": {
"version": "4.2738809-4",
"description": "ActionScript ByteCode Disassembler.",
"dependencies": [
"python2",
"python2-setuptools",
"python2-pyswf"
]
},
"abuse-ssl-bypass-waf": {
"version": "7.c28f98e-7",
"description": "Bypassing WAF by abusing SSL/TLS Ciphers.",
"dependencies": [
"python",
"python-argparse",
"curl",
"sslscan"
]
},
"acccheck": {
"version": "0.2.1-6",
"description": "A password dictionary attack tool that targets windows authentication via the SMB protocol.",
"dependencies": [
"perl",
"smbclient"
]
},
"ace": {
"version": "1.10-4",
"description": "Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface",
"dependencies": []
},
"aclpwn": {
"version": "4.81480cc-10",
"description": "Active Directory ACL exploitation with BloodHound.",
"dependencies": [
"python",
"impacket",
"python-ldap3",
"python-neo4j-driver",
"python-requests",
"python-neotime",
"python-neobolt",
"ldapdomaindump"
]
},
"activedirectoryenum": {
"version": "1:0.5.0-8",
"description": "Enumerate AD through LDAP.",
"dependencies": [
"python",
"python-cffi",
"python-click",
"python-cryptography",
"python-dnspython",
"python-flask",
"python-future",
"impacket",
"python-itsdangerous",
"python-jinja",
"python-ldap3",
"ldapdomaindump",
"python-markupsafe",
"python-progressbar",
"python-pyasn1",
"python-pycparser",
"python-pycryptodomex",
"python-pyopenssl",
"python-six",
"python-termcolor",
"python-werkzeug",
"bloodhound-python"
]
},
"adape-script": {
"version": "43.4d0b9ff-1",
"description": "Active Directory Assessment and Privilege Escalation Script.",
"dependencies": []
},
"adassault": {
"version": "0.0.3.r25.g78741e8-1",
"description": "An Active Directory environments pentest tool complementary to existing ones like NetExec.",
"dependencies": [
"ruby",
"ruby-bundler",
"ruby-erb"
]
},
"adenum": {
"version": "36.fbbe14d-7",
"description": "A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.",
"dependencies": [
"python",
"python-pwntools",
"python-ldap"
]
},
"adexplorersnapshot": {
"version": "107.8bcf1d4-1",
"description": "AD Explorer snapshot parser.",
"dependencies": [
"python",
"bloodhound-python",
"certipy",
"python-frozendict",
"python-pwntools",
"python-dissect.cstruct"
]
},
"adfind": {
"version": "1:v1.0.3.r0.g3a6a055-1",
"description": "Simple admin panel finder for php,js,cgi,asp and aspx admin panels.",
"dependencies": []
},
"adfind-debug": {
"version": "1:v1.0.3.r0.g3a6a055-1",
"description": "Detached debugging symbols for adfind",
"dependencies": []
},
"adfspray": {
"version": "6.3d7745d-6",
"description": "Python3 tool to perform password spraying against Microsoft Online service using various methods.",
"dependencies": [
"python",
"python-colorlog",
"python-requests",
"python-requests-ntlm"
]
},
"adidnsdump": {
"version": "27.9a086d3-4",
"description": "Active Directory Integrated DNS dumping by any authenticated user.",
"dependencies": [
"python",
"python-ldap3",
"python-dnspython",
"python-future",
"impacket"
]
},
"ad-ldap-enum": {
"version": "88.60bc5bb-7",
"description": "An LDAP based Active Directory user and group enumeration tool.",
"dependencies": [
"python",
"python-ldap3",
"python-openpyxl"
]
},
"admid-pack": {
"version": "1:0.1-2",
"description": "ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.",
"dependencies": [
"libpcap"
]
},
"ad-miner": {
"version": "v1.8.0.r0.g055febb-5",
"description": "Active Directory audit tool that extract data from Bloodhound to uncover security weaknesses and generate an HTML report",
"dependencies": [
"python",
"python-poetry"
]
},
"adminpagefinder": {
"version": "0.1-6",
"description": "This python script looks for a large amount of possible administrative interfaces on a given site.",
"dependencies": [
"python2"
]
},
"admsnmp": {
"version": "0.1-5",
"description": "ADM SNMP audit scanner.",
"dependencies": [
"glibc"
]
},
"admsnmp-debug": {
"version": "0.1-5",
"description": "Detached debugging symbols for admsnmp",
"dependencies": []
},
"adpeas": {
"version": "1.3.0.r14.gbda3e0c-3",
"description": "winPEAS, but for Active Directory.",
"dependencies": [
"bloodhound",
"certi",
"certipy",
"impacket",
"netexec",
"python",
"python-ldap3",
"python-regex",
"python-termcolor"
]
},
"aesfix": {
"version": "1.0.1-6",
"description": "A tool to find AES key in RAM.",
"dependencies": []
},
"aesfix-debug": {
"version": "1.0.1-6",
"description": "Detached debugging symbols for aesfix",
"dependencies": []
},
"aeskeyfind": {
"version": "1.0-5",
"description": "A tool to find AES key in RAM.",
"dependencies": []
},
"aespipe": {
"version": "2.4f-1",
"description": "Reads data from stdin and outputs encrypted or decrypted results to stdout.",
"dependencies": []
},
"aesshell": {
"version": "0.7-6",
"description": "A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.",
"dependencies": [
"python2",
"python2-pycryptodome"
]
},
"afflib": {
"version": "3.7.19-2",
"description": "An extensible open format for the storage of disk images and related forensic information.",
"dependencies": [
"ncurses",
"zlib",
"openssl",
"curl",
"expat",
"readline",
"fuse2"
]
},
"afflib-debug": {
"version": "3.7.19-2",
"description": "Detached debugging symbols for afflib",
"dependencies": []
},
"aflplusplus-debug": {
"version": "1:v4.20c.r32.g90fbf59b-1",
"description": "Detached debugging symbols for aflplusplus",
"dependencies": []
},
"agafi": {
"version": "1:1.1-3",
"description": "A gadget finder and a ROP-Chainer tool for x86 platforms.",
"dependencies": []
},
"against": {
"version": "1:0.2-5",
"description": "A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.",
"dependencies": [
"python2-paramiko"
]
},
"aggroargs": {
"version": "51.c032446-3",
"description": "Bruteforce commandline buffer overflows, linux, aggressive arguments.",
"dependencies": [
"python2"
]
},
"aiengine": {
"version": "1:2.0.1-3",
"description": "A packet inspection engine with capabilities of learning without any human intervention.",
"dependencies": [
"boost",
"boost-libs",
"python",
"libpcap"
]
},
"aimage": {
"version": "3.2.5-2",
"description": "A program to create aff-images.",
"dependencies": []
},
"aiodnsbrute": {
"version": "38.e773a4c-9",
"description": "Python 3 DNS asynchronous brute force utility.",
"dependencies": [
"python",
"python-aiodns",
"python-click",
"python-tqdm",
"python-uvloop",
"python-asyncio"
]
},
"air": {
"version": "2.0.0-8",
"description": "A GUI front-end to dd/dc3dd designed for easily creating forensic images.",
"dependencies": [
"perl-tk",
"sharutils"
]
},
"aircrack-ng-beta": {
"version": "1.2-1",
"description": "A key cracker for the 802.11 WEP and WPA-PSK protocols.",
"dependencies": []
},
"airflood": {
"version": "0.1-7",
"description": "A modification of aireplay that allows for a DoS of the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. [Tool in Spanish]",
"dependencies": [
"lib32-glibc"
]
},
"airgeddon": {
"version": "1:v11.40.r0.g48b1bb5-1",
"description": "Multi-use bash script for Linux systems to audit wireless networks.",
"dependencies": [
"bash",
"xterm",
"iw",
"gawk",
"aircrack-ng",
"coreutils",
"sed",
"iproute2",
"tmux",
"pciutils",
"procps-ng"
]
},
"airopy": {
"version": "5.b83f11d-8",
"description": "Get (wireless) clients and access points.",
"dependencies": [
"python",
"python-requests",
"python-termcolor",
"scapy"
]
},
"airoscript": {
"version": "2:45.0a122ee-10",
"description": "A script to simplify the use of aircrack-ng tools.",
"dependencies": [
"mdk3",
"aircrack-ng",
"dhclient",
"perl-yaml-syck"
]
},
"airpwn": {
"version": "1.4-3",
"description": "A tool for generic packet injection on an 802.11 network.",
"dependencies": []
},
"airspyhf": {
"version": "1.6.8.r36.g39f06a4-1",
"description": "Host code for AirspyHF+ SDR.",
"dependencies": [
"libusb"
]
},
"airspyhf-debug": {
"version": "1.6.8.r36.g39f06a4-1",
"description": "Detached debugging symbols for airspyhf",
"dependencies": []
},
"ajpfuzzer": {
"version": "0.6-3",
"description": "A command-line fuzzer for the Apache JServ Protocol (ajp13).",
"dependencies": [
"java-environment"
]
},
"albatar": {
"version": "36.d500657-1",
"description": "A SQLi exploitation framework in Python.",
"dependencies": [
"python2",
"python2-pycurl"
]
},
"allthevhosts": {
"version": "1.0-8",
"description": "A vhost discovery tool that scrapes various web applications.",
"dependencies": [
"python2",
"python2-beautifulsoup4"
]
},
"altdns": {
"version": "78.6728272-1",
"description": "Generates permutations, alterations and mutations of subdomains and then resolves them.",
"dependencies": [
"python",
"python-dnspython",
"python-tldextract",
"python-termcolor",
"python-argparse"
]
},
"amap": {
"version": "1:5.4-5",
"description": "Next-generation tool for assisting network penetration testing.",
"dependencies": []
},
"amass": {
"version": "2:2143.5f1f7176-1",
"description": "In-depth subdomain enumeration written in Go.",
"dependencies": []
},
"amass-debug": {
"version": "2:2143.5f1f7176-1",
"description": "Detached debugging symbols for amass",
"dependencies": []
},
"amber": {
"version": "256.f6eb2dc-1",
"description": "Reflective PE packer.",
"dependencies": [
"nasm",
"mingw-w64-binutils",
"mingw-w64-crt",
"mingw-w64-gcc",
"mingw-w64-headers",
"mingw-w64-headers-bootstrap",
"mingw-w64-winpthreads",
"gcc-multilib",
"keystone"
]
},
"amber-debug": {
"version": "256.f6eb2dc-1",
"description": "Detached debugging symbols for amber",
"dependencies": []
},
"amoco": {
"version": "1:v2.9.11.r4.g3e36c52-1",
"description": "Yet another tool for analysing binaries.",
"dependencies": [
"python",
"python-pyqt5",
"python-grandalf",
"pygoocanvas",
"python-click",
"python-crysp",
"pygtk",
"python-pytest",
"python-traitlets",
"python-tqdm",
"python-pyparsing",
"python-blessed",
"python-z3-solver"
]
},
"analyzemft": {
"version": "133.b6ed04f-1",
"description": "Parse the MFT file from an NTFS filesystem.",
"dependencies": [
"python2"
]
},
"analyzepesig": {
"version": "0.0.0.5-7",
"description": "Analyze digital signature of PE file.",
"dependencies": [
"python2",
"python2-pefile"
]
},
"androbugs": {
"version": "1.7fd3a2c-4",
"description": "An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications.",
"dependencies": [
"python2",
"python2-pyside",
"python2-elfesteem",
"python2-networkx",
"python2-pymongo",
"radare2",
"python2-magic"
]
},
"androguard": {
"version": "3:3.3.5-5",
"description": "Reverse engineering, Malware and goodware analysis of Android applications and more.",
"dependencies": [
"python",
"ipython",
"python-future",
"python-networkx",
"python-pygments",
"python-lxml",
"python-colorama",
"python-matplotlib",
"python-asn1crypto",
"python-click",
"python-pydot"
]
},
"androick": {
"version": "8.522cfb4-1",
"description": "A python tool to help in forensics analysis on android.",
"dependencies": [
"python2",
"python2-magic",
"sqlite",
"android-sdk-build-tools",
"android-sdk-platform-tools",
"android-sdk"
]
},
"android-apktool": {
"version": "2.7.0-1",
"description": "A tool for reverse engineering Android apk files.",
"dependencies": [
"jdk17-openjdk"
]
},
"android-ndk": {
"version": "2:r27-1",
"description": "Android C/C++ developer kit",
"dependencies": [
"android-sdk",
"glibc"
]
},
"androidpincrack": {
"version": "2.ddaf307-2",
"description": "Bruteforce the Android Passcode given the hash and salt.",
"dependencies": [
"python2"
]
},
"android-sdk": {
"version": "26.1.1-1",
"description": "Google Android SDK",
"dependencies": [
"java-environment",
"libxtst",
"fontconfig",
"freetype2",
"lib32-gcc-libs",
"lib32-glibc",
"libx11",
"libxext",
"libxrender",
"zlib"
]
},
"android-sdk-build-tools": {
"version": "r30.0.3-2",
"description": "Build-Tools for Google Android SDK (aapt, aidl, dexdump, dx, llvm-rs-cc).",
"dependencies": [
"zlib"
]
},
"android-sdk-platform-tools": {
"version": "r33.0.0-1",
"description": "Platform-Tools for Google Android SDK (adb and fastboot)",
"dependencies": [
"zlib",
"ncurses"
]
},
"androidsniffer": {
"version": "0.1-5",
"description": "A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.",
"dependencies": [
"perl",
"perl-dbi",
"perl-term-menu"
]
},
"android-udev-rules": {
"version": "1:540.2dba918-1",
"description": "Android udev rules.",
"dependencies": []
},
"androwarn": {
"version": "135.626c02d-9",
"description": "Yet another static code analyzer for malicious Android applications.",
"dependencies": [
"python",
"python-lxml",
"python-future",
"python-argparse",
"python-jinja",
"python-play-scraper",
"androguard"
]
},
"androwarn-debug": {
"version": "135.626c02d-9",
"description": "Detached debugging symbols for androwarn",
"dependencies": []
},
"angr": {
"version": "1:9.1.11752-6",
"description": "The next-generation binary analysis platform from UC Santa Barbaras Seclab.",
"dependencies": [
"python",
"python-capstone",
"python-networkx",
"python-rpyc",
"python-progressbar",
"python-mulpyplexer",
"python-unicorn",
"python-cooldict",
"python-archinfo",
"python-pyvex",
"python-ana",
"python-claripy",
"python-simuvex",
"python-cle",
"libffi",
"python-cachetools",
"python-pyelftools",
"python-cffi",
"python-psutil",
"python-bintrees",
"python-dpkt",
"python-z3-solver",
"python-gitpython",
"python-sortedcontainers",
"python-pycparser",
"python-ailment",
"python-protobuf",
"python-itanium-demangler",
"python-cppheaderparser",
"python-sympy",
"python-nampa"
]
},
"angr-debug": {
"version": "1:9.1.11752-6",
"description": "Detached debugging symbols for angr",
"dependencies": []
},
"angr-management": {
"version": "9.1.11752-7",
"description": "This is the GUI for angr.",
"dependencies": [
"angr",
"python",
"python-websocket-client",
"python-pyzmq",
"ipython",
"python-pyside",
"python-pygraphviz",
"python-enaml",
"python-simuvex",
"python-grandalf",
"python-qtconsole",
"python-atom",
"python-pygments",
"python-qtconsole",
"pyside2",
"python-requests",
"python-toml",
"python-sqlalchemy",
"python-pyxdg",
"python-jupyter_client",
"python-pyqodeng-core"
]
},
"angrop": {
"version": "408.15616aa-4",
"description": "A rop gadget finder and chain builder.",
"dependencies": [
"python",
"angr",
"python-tqdm"
]
},
"angr-py2": {
"version": "1:7.8.9.26-5",
"description": "The next-generation binary analysis platform from UC Santa Barbaras Seclab.",
"dependencies": [
"python2",
"python2-capstone",
"python2-networkx",
"python2-rpyc",
"python2-progressbar",
"python2-mulpyplexer",
"python2-unicorn",
"python2-cooldict",
"python2-archinfo",
"python2-pyvex",
"python2-ana",
"python2-claripy",
"python2-simuvex",
"python2-cle",
"libffi",
"python2-cachetools",
"python2-pyelftools",
"python2-cffi",
"python2-bintrees",
"python2-dpkt",
"python2-z3",
"python2-gitpython",
"python2-sortedcontainers",
"python2-pycparser",
"python2-ailment"
]
},
"angr-py2-debug": {
"version": "1:7.8.9.26-5",
"description": "Detached debugging symbols for angr-py2",
"dependencies": []
},
"anontwi": {
"version": "1.1b-5",
"description": "A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.",
"dependencies": [
"python2",
"python2-pycryptodome",
"python2-httplib2",
"python2-pycurl",
"gtk2",
"pygtk"
]
},
"antiransom": {
"version": "5-1",
"description": "A tool capable of detect and stop attacks of Ransomware using honeypots.",
"dependencies": []
},
"anti-xss": {
"version": "166.2725dc9-4",
"description": "A XSS vulnerability scanner.",
"dependencies": [
"python2",
"python2-reportlab",
"python2-tornado"
]
},
"anubis": {
"version": "1.1.3.r0.g9ea89fa-6",
"description": "Subdomain enumeration and information gathering tool.",
"dependencies": [
"python",
"python-python-nmap",
"python-shodan",
"python-docopt",
"python-requests",
"python-censys",
"python-dnspython"
]
},
"apache-tika": {
"version": "2.9.2-1",
"description": "Toolkit for detecting and extracting metadata and structured text content.",
"dependencies": [
"java-environment",
"bash"
]
},
"apachetomcatscanner": {
"version": "3.2-7",
"description": "Apache Tomcat vulnerability scanner.",
"dependencies": [
"python",
"python-requests",
"python-xlsxwriter",
"python-sectools"
]
},
"apache-users": {
"version": "2.1-6",
"description": "This perl script will enumerate the usernames on a unix system that use the apache module UserDir.",
"dependencies": [
"perl",
"perl-parallel-forkmanager",
"perl-io-socket",
"perl-libwww"
]
},
"apacket": {
"version": "374.16e7036-1",
"description": "Sniffer syn and backscatter packets.",
"dependencies": [
"glibc",
"go",
"libpcap"
]
},
"aphopper": {
"version": "0.3-4",
"description": "A program that automatically hops between access points of different wireless networks.",
"dependencies": []
},
"apkid": {
"version": "2:2.1.5-4",
"description": "Android Application Identifier for Packers, Protectors, Obfuscators and Oddities.",
"dependencies": [
"python",
"python-yara-python-dex"
]
},
"apkleaks": {
"version": "v2.6.3.r0.g05a83a1-1",
"description": "Scanning APK file for URIs, endpoints & secrets.",
"dependencies": [
"python",
"pyaxmlparser",
"jadx"
]
},
"apkstat": {
"version": "18.81cdad3-4",
"description": "Automated Information Retrieval From APKs For Initial Analysis.",
"dependencies": [
"python2",
"android-apktool"
]
},
"apkstudio": {
"version": "100.9e114ca-4",
"description": "An IDE for decompiling/editing & then recompiling of android application binaries.",
"dependencies": [
"qt5-base",
"android-tools",
"android-apktool"
]
},
"apkurlgrep": {
"version": "8.a188a98-1",
"description": "Extract endpoints from APK files.",
"dependencies": []
},
"apkurlgrep-debug": {
"version": "8.a188a98-1",
"description": "Detached debugging symbols for apkurlgrep",
"dependencies": []
},
"apnbf": {
"version": "0.1-4",
"description": "A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.",
"dependencies": [
"python2"
]
},
"appmon": {
"version": "177.f753c4d-6",
"description": "A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida.",
"dependencies": [
"python",
"python-flask",
"python-lxml",
"python-termcolor",
"python-frida",
"python-dataset",
"python-normality",
"python-yaml",
"python-htmlentities",
"python-werkzeug",
"python-sqlalchemy",
"python-six",
"python-mako",
"python-normality",
"python-jinja",
"python-markupsafe",
"python-click",
"python-chardet",
"python-dateutil",
"python-alembic",
"python-banal",
"python-editor",
"python-itsdangerous"
]
},
"apt2": {
"version": "183.8075cdc-1",
"description": "Automated penetration toolkit.",
"dependencies": [
"python2",
"python2-argparse",
"python2-yattag",
"python2-scapy",
"python2-unqlite",
"python2-msgpack",
"python2-setuptools"
]
},
"aquatone": {
"version": "153.30fbf6e-1",
"description": "A Tool for Domain Flyovers.",
"dependencies": [
"chromium"
]
},
"aquatone-debug": {
"version": "153.30fbf6e-1",
"description": "Detached debugging symbols for aquatone",
"dependencies": []
},
"arachni": {
"version": "1.6.1.3.1.g8e5c5d0a9-3",
"description": "A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.",
"dependencies": [
"ruby",
"ruby-bundler",
"curl",
"phantomjs",
"libxslt",
"libxml2"
]
},
"aranea": {
"version": "6.469b9ee-3",
"description": "A fast and clean dns spoofing tool.",
"dependencies": [
"libpcap"
]
},
"arcane": {
"version": "2.750cb9f-2",
"description": "Backdoor iOS packages and create the necessary resources for APT repositories.",
"dependencies": [
"bash",
"bzip2",
"openbsd-netcat"
]
},
"archivebox": {
"version": "903.59da482-9",
"description": "The open source self-hosted web archive. Takes browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more.",
"dependencies": [
"python",
"python-pip",
"yt-dlp",
"wget",
"chromium"
]
},
"ares-debug": {
"version": "v0.10.0.r86.g7f15a8a-1",
"description": "Detached debugging symbols for ares",
"dependencies": []
},
"ares": {
"version": "v0.10.0.r86.g7f15a8a-1",
"description": "Automated decoding of encrypted text without knowing the key or ciphers used.",
"dependencies": []
},
"argus": {
"version": "3.0.8.2-6",
"description": "Network monitoring tool with flow control.",
"dependencies": [
"zlib",
"bash",
"perl",
"libpcap",
"libsasl"
]
},
"argus-clients": {
"version": "3.0.8.2-2",
"description": "Network monitoring client for Argus.",
"dependencies": [
"libedit",
"geoip",
"libmariadbclient",
"libsasl",
"pcre",
"libtirpc-compat"
]
},
"arjun": {
"version": "1:2.2.7.r5.gd1fb995-1",
"description": "HTTP parameter discovery suite.",
"dependencies": [
"python",
"python-requests",
"python-dicttoxml",
"python-ratelimit"
]
},
"armitage": {
"version": "4:150813-7",
"description": "A graphical cyber attack management tool for Metasploit.",
"dependencies": [
"metasploit",
"java-environment",
"nmap",
"postgresql",
"ruby-msgpack"
]
},
"armor": {
"version": "5.bae27a6-1",
"description": "A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.",
"dependencies": [
"bash",
"openssl",
"wget"
]
},
"armscgen": {
"version": "98.c51b7d6-6",
"description": "ARM Shellcode Generator (Mostly Thumb Mode).",
"dependencies": [
"python2",
"python2-capstone",
"python2-keystone",
"unicorn",
"python2-unicorn",
"python2-setuptools"
]
},
"arpalert": {
"version": "1:2.0.12-1",
"description": "Monitor ARP changes in ethernet networks.",
"dependencies": []
},
"arping-debug": {
"version": "2.25-1",
"description": "Detached debugging symbols for arping",
"dependencies": []
},
"arping-th": {
"version": "2.25-2",
"description": "ARP Ping from Thomas Habets (aka Debian arping).",
"dependencies": [
"libnet",
"libcap",
"libpcap"
]
},
"arping-th-debug": {
"version": "2.25-2",
"description": "Detached debugging symbols for arping-th",
"dependencies": []
},
"arpoison": {
"version": "0.7-1",
"description": "The UNIX arp cache update utility",
"dependencies": []
},
"arpon": {
"version": "2.7-2",
"description": "A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.",
"dependencies": []
},
"arpstraw": {
"version": "27.ab40e13-7",
"description": "Arp spoof detection tool.",
"dependencies": [
"python2",
"python2-pyshark",
"python2-netifaces",
"python2-scapy",
"python2-argparse",
"python2-gobject",
"python2-configparser",
"python2-backports",
"python2-apipkg",
"python2-trollius"
]
},
"arptools": {
"version": "13.41cdb23-1",
"description": "A simple tool about ARP broadcast, ARP attack, and data transmission.",
"dependencies": [
"linux-headers"
]
},
"arpwner": {
"version": "26.f300fdf-5",
"description": "GUI-based python tool for arp poisoning and dns poisoning attacks.",
"dependencies": [
"python2",
"python2-pypcap",
"pygtk"
]
},
"artillery": {
"version": "1:357.805a5d8-8",
"description": "A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.",
"dependencies": [
"python",
"python-yaml"
]
},
"artlas": {
"version": "154.e5fdd8d-3",
"description": "Apache Real Time Logs Analyzer System.",
"dependencies": [
"python2",
"python2-requests",
"python2-six",
"python2-urllib3",
"python2-user-agents",
"python2-ua-parser",
"python2-pygtail",
"python2-apache-log-parser",
"python2-py-zabbix",
"python2-telepot"
]
},
"arybo": {
"version": "65.89d9a42-9",
"description": "Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions.",
"dependencies": [
"python",
"python-networkx",
"python-six",
"python-pytanque",
"ipython"
]
},
"asleap": {
"version": "2.2-5",
"description": "Actively recover LEAP/PPTP passwords.",
"dependencies": []
},
"asn": {
"version": "0.78.0-1",
"description": "ASN, RPKI validity, BGP stats, IPv4v6, Prefix, URL, ASPath, Organization, IP reputation, IP geolocation, IP fingerprinting, Network recon, lookup API server, Web traceroute server.",
"dependencies": [
"curl",
"whois",
"bind",
"mtr",
"jq",
"ipcalc",
"grepcidr",
"nmap",
"openbsd-netcat",
"aha"
]
},
"asnmap-debug": {
"version": "v1.1.1.r0.g9eed841-1",
"description": "Detached debugging symbols for asnmap",
"dependencies": []
},
"asnmap": {
"version": "v1.1.1.r0.g9eed841-1",
"description": "Map organization network ranges using ASN information.",
"dependencies": []
},
"asp-audit": {
"version": "2BETA-6",
"description": "An ASP fingerprinting tool and vulnerability scanner.",
"dependencies": [
"perl"
]
},
"aspisec": {
"version": "0.1.0-3",
"description": "Removes the traces left by offensive security tools.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"assassingo": {
"version": "173.2dd8650-2",
"description": "Web pentest framework for information gathering and vulnerability scanning.",
"dependencies": []
},
"assassingo-debug": {
"version": "173.2dd8650-2",
"description": "Detached debugging symbols for assassingo",
"dependencies": []
},
"assetfinder": {
"version": "19.4e95d87-2",
"description": "Find domains and subdomains potentially related to a given domain.",
"dependencies": [
"glibc"
]
},
"assetnote-wordlists": {
"version": "158.bd3c5c2-1",
"description": "Assetnote generated wordlists.",
"dependencies": []
},
"astra": {
"version": "489.092804a-3",
"description": "Automated Security Testing For REST API's.",
"dependencies": [
"python2",
"python2-requests",
"python2-pymongo",
"python2-pyjwt",
"python2-flask",
"python2-argparse",
"sqlmap",
"mongodb"
]
},
"atear": {
"version": "139.245ec8d-5",
"description": "Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration.",
"dependencies": [
"nmap",
"wireshark-cli",
"aircrack-ng",
"hostapd",
"python2-scapy",
"python2",
"python2-requests",
"python2-flask",
"python2-paramiko",
"python2-smartencoding",
"python2-python-libnmap",
"python2-psycopg2",
"python2-pyodbc"
]
},
"athena-ssl-scanner": {
"version": "0.6.2-5",
"description": "A SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.",
"dependencies": [
"java-environment"
]
},
"atlas": {
"version": "7.77bd6c8-8",
"description": "Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS.",
"dependencies": [
"python",
"python-humanfriendly"
]
},
"atscan": {
"version": "2461.06521a9-2",
"description": "Server, Site and Dork Scanner.",
"dependencies": [
"perl",
"perl-io-socket",
"perl-uri",
"perl-term-ansicolor",
"perl-html-parser",
"perl-term-readkey",
"perl-http-cookies",
"perl-getopt-long",
"perl-http-message",
"perl-encode-locale",
"perl-file-copy-recursive",
"perl-libwww"
]
},
"atstaketools": {
"version": "0.1-5",
"description": "This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.",
"dependencies": []
},
"attacksurfacemapper": {
"version": "47.8a402ed-5",
"description": "Tool that aims to automate the reconnaissance process.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-colorama",
"python-dnslib",
"python-dnspython",
"python-ipwhois",
"python-netaddr",
"python-pymongo",
"python-pyopenssl",
"python-requests",
"python-requests-html",
"python-shodan",
"python-tld",
"python-trans",
"python-validator-collection",
"python-selenium",
"python-censys",
"python-backoff"
]
},
"attk": {
"version": "2.0.1023-1",
"description": "Trend Micro Anti-Threat Toolkit.",
"dependencies": []
},
"aurebeshjs": {
"version": "77.75a8fc6-1",
"description": "Translate JavaScript to Other Alphabets.",
"dependencies": [
"php"
]
},
"auto-eap": {
"version": "18.ee36d37-3",
"description": "Automated Brute-Force Login Attacks Against EAP Networks.",
"dependencies": [
"python2",
"wpa_supplicant"
]
},
"auto-eap-debug": {
"version": "18.ee36d37-3",
"description": "Detached debugging symbols for auto-eap",
"dependencies": []
},
"automake-1.11": {
"version": "1.11.6-7",
"description": "A GNU tool for automatically creating Makefiles.",
"dependencies": [
"perl",
"bash"
]
},
"automato": {
"version": "33.0561b59-8",
"description": "Should help with automating some of the user-focused enumeration tasks during an internal penetration test.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"autonessus": {
"version": "24.7933022-4",
"description": "This script communicates with the Nessus API in an attempt to help with automating scans.",
"dependencies": [
"python2",
"python2-requests"
]
},
"autonse": {
"version": "25.7c87f4c-1",
"description": "Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner.",
"dependencies": [
"bash",
"nmap",
"iputils"
]
},
"autopsy": {
"version": "1:4.21.0-5",
"description": "The forensic browser. A GUI for the Sleuth Kit.",
"dependencies": [
"java-runtime",
"testdisk",
"sleuthkit",
"sleuthkit-java",
"python-pytsk3"
]
},
"autopsy-debug": {
"version": "1:4.21.0-5",
"description": "Detached debugging symbols for autopsy",
"dependencies": []
},
"autopwn": {
"version": "190.fc80cef-11",
"description": "Specify targets and run sets of tools against them.",
"dependencies": [
"python",
"python-readchar",
"python-inquirer",
"python-screenutils",
"python-yaml",
"python-blessings",
"nmap",
"skipfish",
"patator",
"hydra",
"cmsmap",
"lynis",
"openssh",
"arachni",
"sslscan",
"metasploit",
"nbtscan",
"enum4linux",
"nikto",
"sslyze",
"dirb",
"linenum",
"httrack",
"testssl.sh",
"linux-exploit-suggester",
"nfs-utils",
"python-pysqlite3",
"python-click-shell",
"python-flask-apscheduler",
"python-flask-restplus",
"python-flask-sqlalchemy",
"python-requests",
"python-werkzeug"
]
},
"autorecon": {
"version": "282.19cc46b-4",
"description": "A multi-threaded network reconnaissance tool which performs automated enumeration of services.",
"dependencies": [
"python",
"python-colorama",
"python-toml",
"nmap",
"python-unidecode",
"feroxbuster",
"oscanner",
"tnscmd",
"redis",
"tnscmd",
"wkhtmltopdf",
"python-appdirs",
"python-psutil",
"impacket"
]
},
"autosint": {
"version": "236.25d292c-4",
"description": "Tool to automate common osint tasks.",
"dependencies": [
"python2",
"python2-python-docx",
"python2-google",
"python2-shodan"
]
},
"autosploit": {
"version": "281.9a6a5ef-3",
"description": "Automate the exploitation of remote hosts.",
"dependencies": [
"python2",
"python2-requests",
"python2-psutil",
"python2-blessings",
"python2-shodan",
"metasploit",
"sudo",
"python2-beautifulsoup4"
]
},
"autovpn": {
"version": "18.28b1a87-4",
"description": "Easily connect to a VPN in a country of your choice.",
"dependencies": [
"openvpn"
]
},
"auto-xor-decryptor": {
"version": "7.2eb176d-7",
"description": "Automatic XOR decryptor tool.",
"dependencies": [
"python"
]
},
"avaloniailspy": {
"version": "1:v7.2.rc.r10.gbc00df4-1",
"description": ".NET Decompiler (port of ILSpy)",
"dependencies": [
"dotnet-runtime"
]
},
"avaloniailspy-debug": {
"version": "1:v7.2.rc.r10.gbc00df4-1",
"description": "Detached debugging symbols for avaloniailspy",
"dependencies": []
},
"avet": {
"version": "559.d561ee3-4",
"description": "AntiVirus Evasion Tool.",
"dependencies": [
"python",
"python-certifi",
"python-contourpy",
"python-cycler",
"python-idna",
"python-charset-normalizer",
"python-fonttools",
"python-joblib",
"python-matplotlib",
"python-lief",
"python-pillow",
"python-requests",
"python-scipy",
"python-sympy",
"python-dateutil",
"python-networkx",
"python-mpmath",
"python-kiwisolver",
"python-threadpoolctl",
"python-typing_extensions",
"python-urllib3",
"wine",
"wine-mono",
"wine_gecko"
]
},
"avet-debug": {
"version": "559.d561ee3-4",
"description": "Detached debugging symbols for avet",
"dependencies": []
},
"avml": {
"version": "1:v0.6.1.r11.g155f084-1",
"description": "A portable volatile memory acquisition tool for Linux.",
"dependencies": []
},
"avr-libc-manpages": {
"version": "2.0.0-2",
"description": "Man pages for the standard C library for Atmel AVR 8-bit RISC microcontrollers.",
"dependencies": []
},
"awsbucketdump": {
"version": "82.4684670-6",
"description": "A tool to quickly enumerate AWS S3 buckets to look for loot.",
"dependencies": [
"python-xmltodict",
"python-requests",
"python-argparse",
"python"
]
},
"aws-extender-cli": {
"version": "17.a351154-9",
"description": "Script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"aws-iam-privesc": {
"version": "11.2983efd-5",
"description": "AWS IAM policy scanner that helps determine where privilege escalation can be achieved.",
"dependencies": [
"python",
"python-requests",
"python-pycryptodome",
"python-termcolor",
"python-boto3",
"python-botocore",
"aws-cli"
]
},
"aws-inventory": {
"version": "19.9a2fa8e-3",
"description": "Discover resources created in an AWS account.",
"dependencies": [
"python2",
"python2-argparse",
"python2-botocore",
"python2-opinel",
"tk"
]
},
"azazel": {
"version": "15.a41fbb5-3",
"description": "A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.",
"dependencies": [
"python2"
]
},
"aztarna": {
"version": "1.2.1-8",
"description": "A footprinting tool for ROS and SROS systems.",
"dependencies": [
"python",
"python-aiohttp",
"python-aiohttp-xmlrpc",
"python-argcomplete",
"python-asn1crypto",
"python-yarl",
"python-async-timeout",
"python-attrs",
"python-babel",
"python-certifi",
"python-cffi",
"python-chardet",
"python-click",
"python-click-plugins",
"python-colorama",
"python-idna",
"python-cryptography",
"python-dnspython",
"python-docutils",
"python-idna_ssl",
"python-imagesize",
"python-ipwhois",
"python-jinja",
"python-lxml",
"python-markupsafe",
"python-multidict",
"python-packaging",
"python-pycparser",
"python-pygments",
"python-pyparsing",
"python-pytz",
"python-requests",
"python-scapy",
"python-shodan",
"python-six",
"python-snowballstemmer",
"python-sphinx",
"python-urllib3",
"python-sphinxcontrib-websupport",
"python-urllib3",
"python-uvloop",
"python-xlsxwriter",
"python-property"
]
},
"backcookie": {
"version": "51.6dabc38-5",
"description": "Small backdoor using cookie.",
"dependencies": [
"python2",
"python2-requests"
]
},
"backdoor-apk": {
"version": "141.2710126-1",
"description": "Shell script that simplifies the process of adding a backdoor to any Android APK file",
"dependencies": [
"smali"
]
},
"backdoor-factory": {
"version": "1:210.0c53045-3",
"description": "Patch win32/64 binaries with shellcode.",
"dependencies": [
"python2",
"python2-capstone",
"python2-pefile",
"python2-setuptools"
]
},
"backdoorme": {
"version": "308.f9755ca-9",
"description": "A powerful utility capable of backdooring Unix machines with a slew of backdoors.",
"dependencies": [
"python",
"python-colorama",
"python-paramiko",
"python-rpyc",
"tk",
"python-scp",
"python-pexpect",
"python-netifaces"
]
},
"backdoorppt": {
"version": "88.d0e7f91-6",
"description": "Transform your payload.exe into one fake word doc (.ppt).",
"dependencies": [
"bash",
"wine",
"zenity",
"xterm",
"ruby"
]
},
"backfuzz": {
"version": "1:1.b0648de-3",
"description": "A network protocol fuzzing toolkit.",
"dependencies": [
"python2"
]
},
"backhack": {
"version": "39.561ec86-3",
"description": "Tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps.",
"dependencies": [
"python2",
"python2-pytz"
]
},
"backoori": {
"version": "55.988e507-3",
"description": "Tool aided persistence via Windows URI schemes abuse.",
"dependencies": [
"glibc"
]
},
"backorifice": {
"version": "1.0-3",
"description": "A remote administration system which allows a user to control a computer across a tcpip connection using a simple console or GUI application.",
"dependencies": []
},
"backports-drivers-frag+ack": {
"version": "1-2",
"description": "mac80211.compat08082009.wl_frag+ack_v1.patch for compat-drivers-patched",
"dependencies": []
},
"bactl": {
"version": "15.6062356-1",
"description": "Script to control BlackArch Linux related environments and setups.",
"dependencies": [
"bash"
]
},
"badkarma": {
"version": "85.2c46334-10",
"description": "Advanced network reconnaissance toolkit.",
"dependencies": [
"python",
"python-python-libnmap",
"python-sqlalchemy",
"phantomjs",
"ffmpeg",
"gtksourceview3",
"osm-gps-map",
"python-gobject",
"mitmproxy",
"python-shodan",
"vte3",
"webkit2gtk"
]
},
"badministration": {
"version": "16.69e4ec2-5",
"description": "A tool which interfaces with management or administration applications from an offensive standpoint.",
"dependencies": [
"python2",
"python2-prettytable",
"python2-pyfiglet",
"python2-click",
"python2-requests",
"python2-termcolor",
"python2-orionsdk",
"python2-mcafee-epo",
"python2-setuptools"
]
},
"bad-pdf": {
"version": "61.a8149ee-3",
"description": "Steal NTLM Hashes with Bad-PDF.",
"dependencies": [
"python2",
"responder"
]
},
"badsecrets": {
"version": "v0.9.29.r0.g67809f0-1",
"description": "A library for detecting known secrets across many web frameworks.",
"dependencies": [
"python",
"python-django",
"python-pycryptodome",
"python-pyjwt",
"python-viewstate",
"flask-unsign"
]
},
"bagbak": {
"version": "313.79ca483-1",
"description": "Yet another frida based App decryptor.",
"dependencies": [
"nodejs",
"zip"
]
},
"bagbak-debug": {
"version": "313.79ca483-1",
"description": "Detached debugging symbols for bagbak",
"dependencies": []
},
"balbuzard": {
"version": "67.d6349ef1bc55-1",
"description": "A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).",
"dependencies": []
},
"bamf-framework": {
"version": "35.30d2b4b-3",
"description": "A modular framework designed to be a platform to launch attacks against botnets.",
"dependencies": [
"python2",
"python2-yara",
"yara",
"python2-simplejson",
"python2-pycurl",
"python2-pygeoip"
]
},
"bandicoot": {
"version": "0.6.0-8",
"description": "A toolbox to analyze mobile phone metadata.",
"dependencies": [
"python"
]
},
"barf": {
"version": "923.9547ef8-9",
"description": "A multiplatform open source Binary Analysis and Reverse engineering Framework.",
"dependencies": [
"python",
"python-pygments",
"python-pyparsing",
"python-pydot",
"python-pyelftools",
"python-capstone",
"python-ropper",
"ropgadget",
"python-future",
"python-networkx",
"python-pefile"
]
},
"barmie": {
"version": "1.01-2",
"description": "Java RMI enumeration and attack tool.",
"dependencies": [
"java-environment"
]
},
"barq": {
"version": "35.6f1a68c-8",
"description": "An AWS Cloud Post Exploitation framework.",
"dependencies": [
"python",
"python-clint",
"python-prettytable",
"python-pygments",
"python-boto3"
]
},
"base64dump": {
"version": "0.0.14-3",
"description": "Extract and decode base64 strings from files.",
"dependencies": [
"python2"
]
},
"basedomainname": {
"version": "0.1-10",
"description": "Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.",
"dependencies": [
"ruby"
]
},
"bashfuscator": {
"version": "338.7487348-8",
"description": "Fully configurable and extendable Bash obfuscation framework.",
"dependencies": [
"python",
"python-argcomplete",
"python-pyperclip"
]
},
"bashscan": {
"version": "94.80c066c-1",
"description": "A port scanner built to utilize /dev/tcp for network and service discovery.",
"dependencies": [
"bash",
"curl",
"bc",
"bind",
"net-tools"
]
},
"batman-adv": {
"version": "2019.2-1",
"description": "Batman kernel module, (included upstream since .38)",
"dependencies": [
"libnl"
]
},
"batman-alfred": {
"version": "2024.3-1",
"description": "Almighty Lightweight Fact Remote Exchange Daemon.",
"dependencies": [
"gpsd",
"libnl",
"dbus"
]
},
"batman-alfred-debug": {
"version": "2024.3-1",
"description": "Detached debugging symbols for batman-alfred",
"dependencies": []
},
"bbqsql": {
"version": "261.b9859d2-5",
"description": "SQL injection exploit tool.",
"dependencies": [
"python2",
"python2-requests",
"python2-gevent",
"python2-eventlet",
"python2-configparser"
]
},
"bbscan": {
"version": "53.29b9f11-1",
"description": "A tiny Batch web vulnerability Scanner.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-ipaddress",
"python2-gevent",
"python2-urllib3",
"python2-requests"
]
},
"bdfproxy": {
"version": "107.276c367-1",
"description": "Patch Binaries via MITM: BackdoorFactory + mitmProxy",
"dependencies": [
"python2",
"python2-simplejson",
"python2-configobj",
"python2-pefile",
"backdoor-factory",
"capstone",
"mitmproxy"
]
},
"bdlogparser": {
"version": "2-4",
"description": "This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintenance of your malware collection.",
"dependencies": [
"perl"
]
},
"bed": {
"version": "0.5-10",
"description": "Collection of scripts to test for buffer overflows, format string vulnerabilities.",
"dependencies": [
"perl"
]
},
"beebug": {
"version": "25.cddb375-8",
"description": "A tool for checking exploitability.",
"dependencies": [
"python",
"python-r2pipe",
"python-pydot",
"python-pygraphviz",
"python-pyqtgraph",
"radare2"
]
},
"beef": {
"version": "1:4670.cd70ba15-1",
"description": "The Browser Exploitation Framework that focuses on the web browser.",
"dependencies": [
"ruby",
"ruby-bundler",
"sqlite",
"python",
"libxslt",
"nodejs",
"ruby-eventmachine"
]
},
"beeswarm": {
"version": "1183.db51ea0-8",
"description": "Honeypot deployment made easy.",
"dependencies": [
"python2",
"python2-pyzmq",
"python2-pycryptodome",
"python2-ecdsa",
"python2-cssselect",
"python2-nose",
"python2-gevent",
"python2-requests",
"python2-telnetsrv",
"python2-paramiko",
"python2-ntplib",
"python2-pysendfile",
"python2-pydes",
"python2-flask",
"python2-flask-login",
"python2-sqlalchemy",
"python2-pyopenssl",
"python2-lxml",
"python2-mock",
"python2-enum34",
"python2-netifaces",
"python2-fs",
"python2-flask-wtf",
"python2-typing",
"python2-future",
"python2-backports-os",
"python2-tornado"
]
},
"beholder": {
"version": "0.8.10-1",
"description": "A wireless intrusion detection tool that looks for anomalies in a wifi environment.",
"dependencies": []
},
"belati": {
"version": "72.49577a1-7",
"description": "The Traditional Swiss Army Knife for OSINT.",
"dependencies": [
"python2",
"python2-requests",
"python2-dnspython",
"python2-argparse",
"python2-texttable",
"python2-python-geoip",
"python2-cmd2",
"python2-python-geoip-geolite2",
"python2-colorama",
"python2-dnsknife",
"python2-termcolor",
"python2-validators",
"python2-tqdm",
"python2-tldextract",
"python2-fake-useragent",
"python2-python-wappalyzer",
"python2-futures",
"python2-future",
"python2-beautifulsoup4",
"python2-python-whois",
"python2-django",
"python2-tabulate",
"python2-api-dnsdumpster",
"python2-pyexifinfo",
"python2-pip"
]
},
"beleth": {
"version": "36.0963699-1",
"description": "A Multi-threaded Dictionary based SSH cracker.",
"dependencies": []
},
"beroot": {
"version": "1.0.1.r109.g4c0b648-4",
"description": "A post exploitation tool to check common misconfigurations to find a way to escalate our privilege.",
"dependencies": [
"python",
"python-dbus"
]
},
"bettercap-ui": {
"version": "1.3.0-1",
"description": "Official Bettercap's Web UI.",
"dependencies": []
},
"bfac": {
"version": "53.18fb0b5-7",
"description": "An automated tool that checks for backup artifacts that may disclose the web-application's source code.",
"dependencies": [
"python",
"python-colorama",
"python-requests",
"python-argparse"
]
},
"bfbtester": {
"version": "2.0.1-3",
"description": "Performs checks of single and multiple argument command line overflows and environment variable overflows",
"dependencies": []
},
"bfuzz": {
"version": "60.fdaefc0-3",
"description": "Input based fuzzer tool for browsers.",
"dependencies": [
"python2"
]
},
"bgp-md5crack": {
"version": "0.1-3",
"description": "RFC2385 password cracker",
"dependencies": [
"libpcap"
]
},
"bgp-md5crack-debug": {
"version": "0.1-3",
"description": "Detached debugging symbols for bgp-md5crack",
"dependencies": []
},
"bgrep": {
"version": "26.6eb0e47-1",
"description": "Binary grep.",
"dependencies": []
},
"bgrep-debug": {
"version": "26.6eb0e47-1",
"description": "Detached debugging symbols for bgrep",
"dependencies": []
},
"billcipher": {
"version": "32.97fba59-2",
"description": "Information Gathering tool for a Website or IP address.",
"dependencies": [
"python",
"python-argparse",
"python-dnspython",
"python-requests",
"python-urllib3"
]
},
"binaryninja": {
"version": "4.2.6455-1",
"description": "A new kind of reversing platform (demo version).",
"dependencies": [
"libglvnd",
"libxkbcommon-x11"
]
},
"binaryninja-debug": {
"version": "4.2.6455-1",
"description": "Detached debugging symbols for binaryninja",
"dependencies": []
},
"binaryninja-demo-debug": {
"version": "4.1.5902-1",
"description": "Detached debugging symbols for binaryninja-demo",
"dependencies": []
},
"binaryninja-python": {
"version": "13.83f59f7-7",
"description": "Binary Ninja prototype written in Python.",
"dependencies": [
"python2",
"python2-pyside",
"python2-pycryptodome",
"python2-pyqt4",
"pyqt4-common",
"pyside2",
"qtwebkit"
]
},
"bindead": {
"version": "4504.67019b97b-2",
"description": "A static analysis tool for binaries",
"dependencies": [
"bash",
"java-runtime"
]
},
"bindiff": {
"version": "6.0.0-1",
"description": "A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.",
"dependencies": [
"java-runtime"
]
},
"binex": {
"version": "1.0-2",
"description": "Format String exploit building tool.",
"dependencies": []
},
"binflow": {
"version": "5.7fb02a9-1",
"description": "POSIX function tracing. Much better and faster than ftrace.",
"dependencies": [
"glibc",
"linux-headers",
"capstone"
]
},
"bing-ip2hosts": {
"version": "1.0.5-1",
"description": "Enumerates all hostnames which Bing has indexed for a specific IP address.",
"dependencies": [
"bash",
"wget",
"bind-tools"
]
},
"bing-lfi-rfi": {
"version": "0.1-5",
"description": "Python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.",
"dependencies": [
"python2"
]
},
"bingoo": {
"version": "3.698132f-1",
"description": "A Linux bash based Bing and Google Dorking Tool.",
"dependencies": [
"bash",
"lynx",
"curl"
]
},
"binnavi": {
"version": "6.1.0-3",
"description": "A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.",
"dependencies": [
"java-environment",
"postgresql"
]
},
"binproxy": {
"version": "8.d02fce9-13",
"description": "A proxy for arbitrary TCP connections.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"binwally": {
"version": "4.0aabd8b-4",
"description": "Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).",
"dependencies": [
"python2",
"cython2",
"python2-pydeep",
"ssdeep"
]
},
"bios_memimage": {
"version": "1.2-3",
"description": "A tool to dump RAM contents to disk (aka cold boot attack).",
"dependencies": []
},
"birp": {
"version": "65.b2e108a-6",
"description": "A tool that will assist in the security assessment of mainframe applications served over TN3270.",
"dependencies": [
"fontconfig",
"xorg-xset",
"xorg-mkfontscale",
"xorg-mkfontdir",
"python2",
"python2-colorama",
"python2-py3270",
"python2-ipython-genutils",
"x3270",
"python2-backports.functools_lru_cache",
"ipython2"
]
},
"bisect": {
"version": "1.3-1",
"description": "Code coverage tool for OCaml.",
"dependencies": []
},
"bitdump": {
"version": "34.6a5cbd8-6",
"description": "A tool to extract database data from a blind SQL injection vulnerability.",
"dependencies": [
"python"
]
},
"bittwist": {
"version": "2.0-2",
"description": "A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.",
"dependencies": []
},
"bkcrack-debug": {
"version": "v1.7.1.r11.g52c95ab-2",
"description": "Detached debugging symbols for bkcrack",
"dependencies": []
},
"bkcrack": {
"version": "v1.7.1.r11.g52c95ab-2",
"description": "Crack legacy zip encryption with Biham and Kocher known plaintext attack.",
"dependencies": [
"gcc-libs",
"glibc"
]
},
"bkhive": {
"version": "1.1.1-2",
"description": "Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.",
"dependencies": []
},
"bkhive-debug": {
"version": "1.1.1-2",
"description": "Detached debugging symbols for bkhive",
"dependencies": []
},
"blackarch-artwork": {
"version": "80.fc42f1e-1",
"description": "Artwork for BlackArch Linux.",
"dependencies": []
},
"blackarch-config-awesome": {
"version": "49.ea88207-1",
"description": "BlackArch menu, theme and config for awesome window manager.",
"dependencies": [
"awesome",
"feh",
"blackarch-wallpaper",
"terminus-font-ttf",
"rxvt-unicode"
]
},
"blackarch-config-bash": {
"version": "11.b2b10c8-2",
"description": "BlackArch config for the bash shell.",
"dependencies": [
"bash"
]
},
"blackarch-config-calamares": {
"version": "20.b453a21-1",
"description": "BlackArch config for the calamares installer.",
"dependencies": [
"calamares"
]
},
"blackarch-config-cursor": {
"version": "3.08b06e5-1",
"description": "BlackArch cursor theme.",
"dependencies": [
"libxcursor"
]
},
"blackarch-config-fluxbox": {
"version": "41.a172928-1",
"description": "BlackArch menu, theme and config for fluxbox window manager.",
"dependencies": [
"fluxbox",
"feh",
"blackarch-wallpaper",
"terminus-font",
"rxvt-unicode"
]
},
"blackarch-config-gtk": {
"version": "4.f9f6a21-3",
"description": "BlackArch config for gtk-2.0.",
"dependencies": [
"feh",
"blackarch-wallpaper"
]
},
"blackarch-config-i3": {
"version": "202.01edbd9-1",
"description": "BlackArch Linux configuration files for the i3 window manager.",
"dependencies": [
"dmenu",
"rofi",
"terminus-font-ttf",
"i3-gaps",
"i3blocks",
"i3lock",
"i3status",
"blackarch-config-x11",
"rxvt-unicode"
]
},
"blackarch-config-icons": {
"version": "6.f4bf107-1",
"description": "BlackArch icons theme.",
"dependencies": [
"gtk-update-icon-cache"
]
},
"blackarch-config-lxdm": {
"version": "20.b109457-1",
"description": "BlackArch config for lxdm X11 login manager.",
"dependencies": [
"lxdm",
"blackarch-wallpaper",
"terminus-font"
]
},
"blackarch-config-openbox": {
"version": "40.6914684-1",
"description": "BlackArch menu, theme and config for openbox window manager.",
"dependencies": [
"openbox",
"feh",
"blackarch-wallpaper",
"terminus-font",
"rxvt-unicode"
]
},
"blackarch-config-spectrwm": {
"version": "8.ee5d156-2",
"description": "BlackArch menu, theme and config for spectrwm window manager.",
"dependencies": [
"spectrwm",
"feh",
"blackarch-wallpaper",
"terminus-font",
"rxvt-unicode"
]
},
"blackarch-config-vim": {
"version": "1:3.620775f-1",
"description": "BlackArch config for the VIM editor.",
"dependencies": [
"vim",
"ctags"
]
},
"blackarch-config-vim-debug": {
"version": "1:3.620775f-1",
"description": "Detached debugging symbols for blackarch-config-vim",
"dependencies": []
},
"blackarch-config-wmii": {
"version": "1.8c8d638-2",
"description": "BlackArch menu, theme and config for wmii window manager.",
"dependencies": [
"wmii",
"feh",
"blackarch-wallpaper"
]
},
"blackarch-config-x11": {
"version": "21.e38cf84-1",
"description": "BlackArch config for the X11 user settings.",
"dependencies": [
"xterm",
"rxvt-unicode",
"terminus-font"
]
},
"blackarch-config-xfce": {
"version": "15.996cb2d-1",
"description": "BlackArch theme and config for xfce desktop enviroment.",
"dependencies": [
"blackarch-menus"
]
},
"blackarch-config-zsh": {
"version": "12.1ee1abb-2",
"description": "BlackArch config for the zsh shell.",
"dependencies": [
"zsh"
]
},
"blackarch-devtools": {
"version": "1:1.6-1",
"description": "Tools for BlackArch Linux package maintainers.",
"dependencies": [
"devtools"
]
},
"blackarch-devtools-toolkit": {
"version": "53.e393678-2",
"description": "Development framework for the BlackArch Linux distribution written in Rust.",
"dependencies": [
"devtools"
]
},
"blackarch-installer": {
"version": "1.2.24-1",
"description": "The official BlackArch Linux installer.",
"dependencies": [
"bash"
]
},
"blackarch-installer-debug": {
"version": "1.2.24-1",
"description": "Detached debugging symbols for blackarch-installer",
"dependencies": []
},
"blackarch-keyring": {
"version": "20180925-5",
"description": "BlackArch Linux PGP keyring.",
"dependencies": []
},
"blackarch-menus": {
"version": "10.5244eea-3",
"description": "BlackArch specific XDG-compliant menu.",
"dependencies": [
"xdg-utils"
]
},
"blackarch-mirrorlist": {
"version": "20241214-1",
"description": "BlackArch Linux mirror list file.",
"dependencies": [
"pacman"
]
},
"blackarch-officials": {
"version": "20241215-1",
"description": "Meta package for installing official security tools from the Arch Linux repository.",
"dependencies": [
"afl++",
"afpfs-ng",
"aircrack-ng",
"argon2",
"arp-scan",
"atftp",
"bandit",
"batctl",
"bettercap",
"bind",
"binwalk",
"bless",
"bully",
"cadaver",
"capstone",
"cfr",
"checksec",
"chntpw",
"clash",
"corkscrew",
"cowpatty",
"cppcheck",
"crosstool-ng",
"darkstat",
"ddrescue",
"distorm",
"dive",
"dscanner",
"dsniff",
"elfkickers",
"elfutils",
"etherape",
"ettercap",
"evilginx",
"exploitdb",
"fcrackzip",
"findomain",
"flawfinder",
"foremost",
"fping",
"freeipmi",
"freeradius",
"gdb",
"gdb-common",
"geoip",
"ghidra",
"gitleaks",
"gnuradio",
"gqrx",
"gsocket",
"hackrf",
"hashcat",
"hashcat-utils",
"hcxdumptool",
"hcxkeys",
"hcxtools",
"hexyl",
"hping",
"httping",
"httptunnel",
"httrack",
"hydra",
"i2pd",
"iaito",
"iodine",
"ipmitool",
"iputils",
"jad",
"jadx",
"jhead",
"john",
"kcptun",
"kismet",
"libpst",
"lldb",
"lorcon",
"ltrace",
"lynis",
"macchanger",
"masscan",
"mat2",
"mdk4",
"medusa",
"metasploit",
"mfoc",
"mitmproxy",
"mtr",
"multimon-ng",
"nbtscan",
"ncrack",
"netsniff-ng",
"ngrep",
"nikto",
"nmap",
"onionshare",
"open-iscsi",
"ophcrack",
"p0f",
"packer",
"packeth",
"pdfcrack",
"peda",
"perl-image-exiftool",
"pixiewps",
"proxmark3",
"proxychains-ng",
"proxytunnel",
"ptunnel",
"pwndbg",
"python-capstone",
"python-jsbeautifier",
"python-pwntools",
"python-shodan",
"r2ghidra",
"radamsa",
"radare2",
"rarcrack",
"rathole",
"reaver",
"rfdump",
"rizin",
"rkhunter",
"ropgadget",
"ropper",
"routersploit",
"rustscan",
"rz-cutter",
"rz-ghidra",
"scanmem",
"scapy",
"scrapy",
"shellcheck",
"siege",
"sleuthkit",
"slowhttptest",
"smali",
"sniffglue",
"socat",
"spiped",
"splint",
"sqlmap",
"ssdeep",
"ssh-audit",
"sshtunnel",
"sshuttle",
"sslh",
"sslscan",
"strace",
"stunnel",
"subbrute",
"swaks",
"sysdig",
"tcpdump",
"tcpflow",
"tcpreplay",
"testdisk",
"testssl.sh",
"thc-ipv6",
"tinc",
"tinyproxy",
"tor",
"torsocks",
"traceroute",
"trivy",
"udp2raw",
"unhide",
"upx",
"urh",
"valabind",
"valgrind",
"veracrypt",
"volatility3",
"vulscan",
"wavemon",
"wifite",
"wireshark-cli",
"wireshark-qt",
"wpscan",
"xortool",
"yara",
"zaproxy",
"zmap",
"zssh",
"zzuf"
]
},
"blackarch-wallpaper": {
"version": "1:3.0-2",
"description": "The default BlackArch Linux wallpaper.",
"dependencies": []
},
"blackbox-scanner": {
"version": "4:1.7a25220-1",
"description": "Dork scanner & bruteforcing & hash cracker with blackbox framework.",
"dependencies": [
"python2",
"python2-requests",
"python2-pexpect",
"python2-passlib"
]
},
"blackeye": {
"version": "1:v2.5.r8.gbdc11a2-1",
"description": "Ultimate phishing tool with ngrok and serveo.",
"dependencies": [
"curl",
"php",
"wget",
"ngrok",
"unzip"
]
},
"blackhash": {
"version": "0.2-8",
"description": "Creates a filter from system hashes.",
"dependencies": [
"crypto++"
]
},
"blackman": {
"version": "0.5.14-1",
"description": "Emerge for BlackArch Linux - Download and compile packages as emerge does.",
"dependencies": [
"git",
"subversion"
]
},
"blackmate": {
"version": "49.6e5f2d3-1",
"description": "BlackArch specific Xfce4 WM.",
"dependencies": [
"xdg-utils",
"blackarch-config-gtk",
"xfce4-terminal",
"xfce4-session",
"blackarch-menus",
"sudo",
"wget"
]
},
"blacknurse": {
"version": "9.d2a2b23-1",
"description": "A low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls.",
"dependencies": []
},
"bladerf": {
"version": "0.9.0-5",
"description": "Driver for bladeRF, allowing general purpose software defined radio (SDR).",
"dependencies": []
},
"bleah": {
"version": "53.6a2fd3a-1",
"description": "A BLE scanner for \"smart\" devices hacking.",
"dependencies": [
"python2",
"python2-argparse",
"python2-terminaltables",
"python2-bluepy"
]
},
"bletchley": {
"version": "0.0.1-16",
"description": "A collection of practical application cryptanalysis tools.",
"dependencies": [
"python3",
"python-requests"
]
},
"bletchley-debug": {
"version": "0.0.1-16",
"description": "Detached debugging symbols for bletchley",
"dependencies": []
},
"blindelephant": {
"version": "7-2",
"description": "A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations",
"dependencies": []
},
"blindsql": {
"version": "1.0-3",
"description": "Set of bash scripts for blind SQL injection attacks.",
"dependencies": [
"bash"
]
},
"blind-sql-bitshifting": {
"version": "1:1.c1da934-1",
"description": "A blind SQL injection module that uses bitshfting to calculate characters.",
"dependencies": [
"python2",
"python2-requests"
]
},
"blindy": {
"version": "12.59de8f2-9",
"description": "Simple script to automate brutforcing blind sql injection vulnerabilities.",
"dependencies": [
"python",
"python-argparse",
"python-requests"
]
},
"blisqy": {
"version": "20.e9995fc-5",
"description": "Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).",
"dependencies": [
"python"
]
},
"bloodhound": {
"version": "1:v4.3.1.r41.g0d36459-2",
"description": "Six Degrees of Domain Admin",
"dependencies": [
"nodejs",
"neo4j-community",
"alsa-lib",
"gtk3",
"libxss",
"nss",
"gconf",
"libxtst",
"jre17-openjdk-headless"
]
},
"bloodhound-ce-python": {
"version": "v1.0.1.r182.g3def775-2",
"description": "Python data collector for Bloodhound community edition (v5)",
"dependencies": [
"python",
"python-dnspython",
"impacket",
"python-ldap3",
"python-pyasn1",
"python-pycryptodome"
]
},
"bloodhound-python": {
"version": "v1.0.1.r167.gc88eea6-1",
"description": "Python data collector for Bloodhound legcacy (v4)",
"dependencies": [
"python",
"python-dnspython",
"impacket",
"python-ldap3",
"python-pyasn1",
"python-pycryptodome"
]
},
"bloodyad": {
"version": "215.b52a7e3-1",
"description": "An Active Directory Privilege Escalation Framework.",
"dependencies": [
"python",
"python-ldap3",
"python-dsinternals",
"python-winacl",
"impacket",
"python-neo4j-driver",
"python-gssapi"
]
},
"bluebox-ng": {
"version": "1:1.1.0-4",
"description": "A GPL VoIP/UC vulnerability scanner.",
"dependencies": [
"nodejs",
"coffee-script",
"python2",
"nmap"
]
},
"bluebugger": {
"version": "0.1-4",
"description": "An implementation of the bluebug technique which was discovered by Martin Herfurt.",
"dependencies": [
"bluez-libs"
]
},
"bluediving": {
"version": "0.9-8",
"description": "A Bluetooth penetration testing suite.",
"dependencies": [
"bluez-utils",
"sox",
"obexftp",
"readline",
"expat",
"perl-xml-simple",
"openobex",
"libxml2"
]
},
"bluediving-debug": {
"version": "0.9-8",
"description": "Detached debugging symbols for bluediving",
"dependencies": []
},
"bluefog": {
"version": "0.0.4-3",
"description": "A tool that can generate an essentially unlimited number of phantom Bluetooth devices.",
"dependencies": [
"bluez",
"bluez-libs"
]
},
"blue-hydra": {
"version": "710.1c2372d-3",
"description": "A Bluetooth device discovery service built on top of the bluez library.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"bluelog": {
"version": "1.1.2-1",
"description": "A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.",
"dependencies": []
},
"bluepot": {
"version": "0.2-1",
"description": "A Bluetooth Honeypot written in Java, it runs on Linux.",
"dependencies": [
"java-environment",
"gksu"
]
},
"blueprint": {
"version": "0.1_3-9",
"description": "A perl tool to identify Bluetooth devices.",
"dependencies": [
"perl",
"perl-switch"
]
},
"blueranger": {
"version": "1.0-3",
"description": "A simple Bash script which uses Link Quality to locate Bluetooth device radios.",
"dependencies": []
},
"bluescan": {
"version": "1.0.6-3",
"description": "A Bluetooth Device Scanner.",
"dependencies": [
"bash",
"bluez-libs",
"bluez",
"bluez-utils",
"bluez-hciconfig"
]
},
"bluesnarfer": {
"version": "0.1-5",
"description": "A bluetooth attacking tool.",
"dependencies": [
"bluez-libs"
]
},
"bluez-hciconfig": {
"version": "5.65-1",
"description": "Deprecated hciconfig tool from bluez.",
"dependencies": [
"bluez",
"bluez-utils",
"bluez-libs",
"bluez-tools"
]
},
"bluffy": {
"version": "47.180ed5b-6",
"description": "Convert shellcode into different formats.",
"dependencies": [
"python",
"python-rich"
]
},
"bluphish": {
"version": "9.a7200bd-2",
"description": "Bluetooth device and service discovery tool that can be used for security assessment and penetration testing.",
"dependencies": [
"java-environment"
]
},
"bluto": {
"version": "1:142.25cad7a-1",
"description": "Recon, Subdomain Bruting, Zone Transfers.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-beautifulsoup4",
"python2-lxml",
"python2-termcolor",
"python2-pythonwhois",
"python2-docopt",
"python2-requests",
"python2-pdfminer",
"python2-oletools"
]
},
"bmap-tools": {
"version": "3.7-3",
"description": "Tool for copying largely sparse files using information from a block map file.",
"dependencies": [
"python2"
]
},
"bmc-tools": {
"version": "36.94037ce-1",
"description": "RDP Bitmap Cache parser.",
"dependencies": [
"python2"
]
},
"bob-the-butcher": {
"version": "0.7.1-2",
"description": "A distributed password cracker package.",
"dependencies": []
},
"bof-detector": {
"version": "19.e08367d-2",
"description": "A simple detector of BOF vulnerabilities by source-code-level check.",
"dependencies": [
"python2",
"python2-lxml"
]
},
"bonesi": {
"version": "12.733c9e9-1",
"description": "The DDoS Botnet Simulator.",
"dependencies": [
"libnet",
"libpcap"
]
},
"boofuzz": {
"version": "v0.4.2.r27.g10a1501-1",
"description": null,
"dependencies": [
"python",
"python-virtualenv"
]
},
"boopsuite": {
"version": "170.16c902f-1",
"description": "A Suite of Tools written in Python for wireless auditing and security testing.",
"dependencies": [
"python2",
"python2-argparse",
"python2-tabulate",
"python2-pyric",
"python2-netaddr",
"python2-scapy"
]
},
"bopscrk": {
"version": "1:v2.4.7.r2.g7eede16-4",
"description": "Tool to generate smart wordlists, eg. based on lyrics.",
"dependencies": [
"python",
"python-requests",
"python-alive-progress"
]
},
"botb": {
"version": "69.6d33aae-1",
"description": "A container analysis and exploitation tool for pentesters and engineers.",
"dependencies": [
"glibc"
]
},
"bowcaster": {
"version": "230.17d69c1-3",
"description": "A framework intended to aid those developing exploits.",
"dependencies": [
"python2"
]
},
"box-js": {
"version": "703.a3bb0c8-1",
"description": "A tool for studying JavaScript malware.",
"dependencies": [
"nodejs",
"gnuplot"
]
},
"bqm": {
"version": "v1.5.1.r5.ge287280-3",
"description": "Download BloudHound query lists, deduplicate entries and merge them in one file.",
"dependencies": [
"ruby"
]
},
"braa": {
"version": "0.82-5",
"description": "A mass snmp scanner",
"dependencies": []
},
"braces": {
"version": "0.4-1",
"description": "A Bluetooth Tracking Utility.",
"dependencies": []
},
"brakeman": {
"version": "1:v7.0.0.r8.g996a5b5c7-1",
"description": "A static analysis security vulnerability scanner for Ruby on Rails applications.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"breads": {
"version": "131.2d97bcc-5",
"description": "BREaking Active Directory Security; focused on enumerating and attacking Active Directory environments through LDAP and SMB protocols.",
"dependencies": [
"python",
"python-ldap3",
"python-rich",
"impacket"
]
},
"bridgekeeper": {
"version": "57.55c390c-7",
"description": "Scrape employee names from search engine LinkedIn profiles. Convert employee names to a specified username format.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-lxml",
"python-colorama"
]
},
"brosec": {
"version": "278.c51164f-1",
"description": "An interactive reference tool to help security professionals utilize useful payloads and commands.",
"dependencies": [
"nodejs",
"xsel"
]
},
"brotli06": {
"version": "0.6.0-3",
"description": "Brotli compression library - legacy 0.6.x version",
"dependencies": [
"gcc-libs"
]
},
"brotli06-testdata": {
"version": "0.6.0-3",
"description": "Brotli compression library - legacy 0.6.x version",
"dependencies": []
},
"browselist": {
"version": "1.4-2",
"description": "Retrieves the browse list ; the output list contains computer names, and the roles they play in the network.",
"dependencies": []
},
"browser-fuzzer": {
"version": "3-3",
"description": "Browser Fuzzer 3",
"dependencies": []
},
"brute12": {
"version": "1-5",
"description": "A tool designed for auditing the cryptography container security in PKCS12 format.",
"dependencies": []
},
"brute-force": {
"version": "52.78d1d8e-8",
"description": "Brute-Force attack tool for Gmail Hotmail Twitter Facebook Netflix.",
"dependencies": [
"python",
"python-mechanize",
"python-proxylist"
]
},
"bruteforce-luks": {
"version": "54.788d637-1",
"description": "Try to find the password of a LUKS encrypted volume.",
"dependencies": [
"cryptsetup"
]
},
"bruteforce-luks-debug": {
"version": "54.788d637-1",
"description": "Detached debugging symbols for bruteforce-luks",
"dependencies": []
},
"bruteforce-salted-openssl": {
"version": "64.30b272e-1",
"description": "Try to find the password of a file that was encrypted with the 'openssl' command.",
"dependencies": [
"openssl"
]
},
"bruteforce-salted-openssl-debug": {
"version": "64.30b272e-1",
"description": "Detached debugging symbols for bruteforce-salted-openssl",
"dependencies": []
},
"bruteforce-wallet": {
"version": "43.648d7d7-1",
"description": "Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc...) wallet file.",
"dependencies": [
"openssl",
"db5.3"
]
},
"bruteforce-wallet-debug": {
"version": "43.648d7d7-1",
"description": "Detached debugging symbols for bruteforce-wallet",
"dependencies": []
},
"brutemap": {
"version": "65.da4b303-3",
"description": "Penetration testing tool that automates testing accounts to the site's login page.",
"dependencies": [
"python2",
"python2-argparse",
"python2-colorama",
"python2-requests",
"python2-selenium",
"python2-termcolor",
"geckodriver",
"python2-backports.shutil_get_terminal_size"
]
},
"brutespray": {
"version": "496.4c709ab-1",
"description": "Brute-Forcing from Nmap output - Automatically attempts default creds on found services.",
"dependencies": []
},
"brutespray-debug": {
"version": "496.4c709ab-1",
"description": "Detached debugging symbols for brutespray",
"dependencies": []
},
"brutessh": {
"version": "0.6-5",
"description": "A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads.",
"dependencies": [
"python2",
"python2-paramiko"
]
},
"brutex": {
"version": "114.eacd084-1",
"description": "Automatically brute force all services running on a target.",
"dependencies": [
"bash",
"hydra",
"masscan",
"nmap",
"net-snmp",
"dnsenum"
]
},
"brutexss": {
"version": "54.ba753df-1",
"description": "Cross-Site Scripting Bruteforcer.",
"dependencies": [
"python2",
"python2-lxml"
]
},
"brutus": {
"version": "2-6",
"description": "One of the fastest, most flexible remote password crackers you can get your hands on.",
"dependencies": []
},
"bsdiff": {
"version": "4.3-14",
"description": "Tools for building and applying patches to binary files.",
"dependencies": [
"bzip2"
]
},
"bsdiff-debug": {
"version": "4.3-14",
"description": "Detached debugging symbols for bsdiff",
"dependencies": []
},
"bsqlbf": {
"version": "2.7-6",
"description": "Blind SQL Injection Brute Forcer.",
"dependencies": [
"perl",
"perl-getopt-long",
"perl-libwww"
]
},
"bsqlinjector": {
"version": "14.98c8ce8-2",
"description": "Blind SQL injection exploitation tool written in ruby.",
"dependencies": [
"ruby"
]
},
"bss": {
"version": "0.8-6",
"description": "Bluetooth stack smasher / fuzzer.",
"dependencies": [
"bluez-libs"
]
},
"bss-debug": {
"version": "0.8-6",
"description": "Detached debugging symbols for bss",
"dependencies": []
},
"bt_audit": {
"version": "0.1.1-4",
"description": "Bluetooth audit",
"dependencies": []
},
"btcrack": {
"version": "1.1-4",
"description": "The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.",
"dependencies": []
},
"btlejack": {
"version": "88.c487859-5",
"description": "Bluetooth Low Energy Swiss-army knife.",
"dependencies": [
"python",
"python-pyserial",
"python-argparse",
"python-halo"
]
},
"btproxy-mitm": {
"version": "71.cd1c906-6",
"description": "Man in the Middle analysis tool for Bluetooth.",
"dependencies": [
"python2",
"python2-dbus",
"bluez-libs",
"gcc"
]
},
"btproxy-mitm-debug": {
"version": "71.cd1c906-6",
"description": "Detached debugging symbols for btproxy-mitm",
"dependencies": []
},
"btscanner": {
"version": "2.1-9",
"description": "Bluetooth device scanner.",
"dependencies": [
"bluez-libs",
"libxml2",
"ncurses5-compat-libs"
]
},
"bulk-extractor": {
"version": "1562.1c67a75-1",
"description": "Bulk Email and URL extraction tool.",
"dependencies": [
"tre",
"java-environment",
"openssl",
"exiv2",
"afflib",
"libewf",
"ncurses5-compat-libs"
]
},
"bunny": {
"version": "0.93-6",
"description": "A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.",
"dependencies": [
"openssl"
]
},
"burpsuite": {
"version": "1:2025.1.2-1",
"description": "An integrated platform for attacking web applications (community edition) + SHELLING plugin.",
"dependencies": [
"java-runtime>=17",
"giflib",
"libxext",
"libxrender",
"libxtst"
]
},
"buster": {
"version": "92.131437e-11",
"description": "Find emails of a person and return info associated with them.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-yaml",
"python-lxml",
"python-grequests",
"python-gevent",
"twint",
"cython",
"python-dataclasses",
"python-certifi"
]
},
"buttinsky": {
"version": "138.1a2a1b2-11",
"description": "Provide an open source framework for automated botnet monitoring.",
"dependencies": [
"python2",
"python2-configobj",
"python2-gevent",
"python2-validictory",
"python2-pysocks",
"python2-hpfeeds",
"python2-setuptools"
]
},
"bvi": {
"version": "1.4.2-1",
"description": "A display-oriented editor for binary files operate like \"vi\" editor.",
"dependencies": [
"ncurses5-compat-libs"
]
},
"bvi-debug": {
"version": "1.4.2-1",
"description": "Detached debugging symbols for bvi",
"dependencies": []
},
"byacc-noconflict": {
"version": "20150711-1",
"description": "Non-conflicting version of byacc not providing bison/yacc.",
"dependencies": []
},
"byepass": {
"version": "213.8cbfd9b-4",
"description": "Automates password cracking tasks using optimized dictionaries and mangling rules.",
"dependencies": [
"john",
"python",
"python-argparse",
"unzip"
]
},
"bypass-firewall-dns-history": {
"version": "33.c55b7ce-1",
"description": "Firewall bypass script based on DNS history records.",
"dependencies": [
"bash"
]
},
"bytecode-viewer": {
"version": "1:2.12-1",
"description": "A Java 8/Android APK Reverse Engineering Suite.",
"dependencies": [
"java-environment"
]
},
"c5scan": {
"version": "30.be8845c-4",
"description": "Vulnerability scanner and information gatherer for the Concrete5 CMS.",
"dependencies": [
"python2",
"python2-argparse",
"python2-lxml",
"python2-requests",
"python2-httplib2"
]
},
"c7decrypt": {
"version": "0.3.3-3",
"description": "Cisco password type-7 encryptor and decryptor.",
"dependencies": [
"ruby"
]
},
"cachedump": {
"version": "1.1-4",
"description": "A tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH).",
"dependencies": []
},
"cafebabe": {
"version": "0.1.2-1",
"description": "Java bytecode editor & decompiler.",
"dependencies": [
"java-environment"
]
},
"calamares": {
"version": "3:3.3.0.23.0321-1",
"description": "Distribution-independent installer framework.",
"dependencies": [
"kconfig",
"kcoreaddons",
"kiconthemes",
"ki18n",
"kio",
"solid",
"yaml-cpp",
"kpmcore",
"mkinitcpio-openswap",
"boost-libs",
"ckbcomp",
"hwinfo",
"qt5-svg",
"polkit-qt5",
"gtk-update-icon-cache",
"plasma-framework",
"qt5-xmlpatterns",
"squashfs-tools",
"libpwquality",
"appstream-qt",
"icu",
"efibootmgr",
"kdbusaddons",
"python"
]
},
"calamares-debug": {
"version": "3:3.3.0.23.0321-1",
"description": "Detached debugging symbols for calamares",
"dependencies": []
},
"cameradar": {
"version": "195.1b91e54-1",
"description": "Hacks its way into RTSP videosurveillance cameras.",
"dependencies": [
"nmap"
]
},
"camlidl": {
"version": "1.09-1",
"description": "A stub code generator and COM binding for Objective Caml (OCaml).",
"dependencies": [
"ocaml"
]
},
"camomile": {
"version": "0.8.5-1",
"description": "Comprehensive Unicode library for OCaml.",
"dependencies": []
},
"camover": {
"version": "94.483befd-4",
"description": "A camera exploitation tool that allows to disclosure network camera admin password.",
"dependencies": [
"python",
"python-requests",
"python-shodan",
"python-badges"
]
},
"camscan": {
"version": "1.0057215-4",
"description": "A tool which will analyze the CAM table of Cisco switches to look for anamolies.",
"dependencies": [
"python2",
"python2-paramiko"
]
},
"canalyzat0r": {
"version": "41.6bc251e-9",
"description": "Security analysis toolkit for proprietary car protocols.",
"dependencies": [
"can-utils",
"ffmpeg",
"iproute2",
"python",
"python-pyside",
"python-pyvit",
"python-sphinx_rtd_theme",
"python-can",
"python-aenum"
]
},
"canari": {
"version": "3.3.10-5",
"description": "Maltego rapid transform development and execution framework.",
"dependencies": [
"python2",
"python2-argparse",
"python2-flask",
"python2-mr.bob",
"python2-safedexml",
"python2-pyasn1",
"python2-twistedx",
"python2-pyopenssl",
"python2-boto3",
"python2-lxml",
"python2-six",
"python2-future",
"python2-click",
"python2-colorama",
"python2-stringcase",
"python2-service-identity",
"python2-setuptools"
]
},
"cangibrina": {
"version": "123.6de0165-3",
"description": "Dashboard Finder.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-pysocks",
"python2-mechanize",
"python2-html5lib"
]
},
"cansina": {
"version": "2:59.67c6301-3",
"description": "A python-based Web Content Discovery Tool.",
"dependencies": [
"python",
"python-requests",
"java-environment"
]
},
"cantoolz": {
"version": "1:425.82d330b-11",
"description": "Framework for black-box CAN network analysis.",
"dependencies": [
"python",
"python-pyserial",
"python-numpy",
"python-mido",
"python-flask",
"python-bitstring"
]
},
"can-utils": {
"version": "1205.2b8c7c5-1",
"description": "Linux-CAN / SocketCAN user space applications.",
"dependencies": []
},
"can-utils-debug": {
"version": "1205.2b8c7c5-1",
"description": "Detached debugging symbols for can-utils",
"dependencies": []
},
"capa": {
"version": "7.4.0-1",
"description": "The FLARE team's open-source tool to identify capabilities in executable files.",
"dependencies": []
},
"capa-debug": {
"version": "7.4.0-1",
"description": "Detached debugging symbols for capa",
"dependencies": []
},
"capfuzz": {
"version": "34.97ac312-10",
"description": "Capture, fuzz and intercept web traffic.",
"dependencies": [
"python",
"python-tornado",
"python-requests",
"mitmproxy"
]
},
"captipper": {
"version": "74.3fb2836-3",
"description": "Malicious HTTP traffic explorer tool.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-colorama"
]
},
"cardpwn": {
"version": "32.166abf9-8",
"description": "OSINT Tool to find Breached Credit Cards Information.",
"dependencies": [
"python",
"python-google",
"python-requests"
]
},
"cariddi-debug": {
"version": "v1.3.5.r14.g88bcf27-1",
"description": "Detached debugging symbols for cariddi",
"dependencies": []
},
"cariddi": {
"version": "v1.3.5.r14.g88bcf27-1",
"description": "Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, token.",
"dependencies": []
},
"carwhisperer": {
"version": "0.2-4",
"description": "Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.",
"dependencies": []
},
"casefile": {
"version": "1.0.1-7",
"description": "The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information",
"dependencies": []
},
"catana": {
"version": "31.9ea1f0d-1",
"description": "Filter your wordlist according to the specified password policy.",
"dependencies": [
"bash"
]
},
"catnthecanary": {
"version": "7.e9184fe-4",
"description": "An application to query the canary.pw data set for leaked data.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-requests",
"python2-wsgiref"
]
},
"catphish": {
"version": "44.768d213-12",
"description": "For phishing and corporate espionage.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"ccrawldns": {
"version": "6.92525b6-6",
"description": "Retrieves from the CommonCrawl data set unique subdomains for a given domain name.",
"dependencies": [
"python",
"python-requests",
"python-argparse"
]
},
"cdpsnarf": {
"version": "0.1.6-5",
"description": "Cisco discovery protocol sniffer.",
"dependencies": []
},
"cecster": {
"version": "5.15544cb-7",
"description": "A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols.",
"dependencies": [
"python2",
"python2-pyserial",
"wxpython",
"python2-pyusb"
]
},
"cent-debug": {
"version": "v1.3.4.r4.g601e4da-1",
"description": "Detached debugging symbols for cent",
"dependencies": []
},
"centry": {
"version": "72.6de2868-3",
"description": "Cold boot & DMA protection",
"dependencies": [
"python",
"python-pmw"
]
},
"cent": {
"version": "v1.3.4.r4.g601e4da-1",
"description": "Community edition nuclei templates.",
"dependencies": []
},
"cero-debug": {
"version": "v1.3.0.r19.gb73125b-1",
"description": "Detached debugging symbols for cero",
"dependencies": []
},
"cero": {
"version": "v1.3.0.r19.gb73125b-1",
"description": "Scrape domain names from SSL certificates of arbitrary hosts.",
"dependencies": [
"glibc"
]
},
"certgraph": {
"version": "172.465bddc-1",
"description": "Crawl the graph of certificate Alternate Names.",
"dependencies": [
"glibc"
]
},
"certgraph-debug": {
"version": "172.465bddc-1",
"description": "Detached debugging symbols for certgraph",
"dependencies": []
},
"certi": {
"version": "6.6cfa656-4",
"description": "Active Directory Certificate Services (ADCS) abuser. impacket copy of Certify.",
"dependencies": [
"python",
"python-cryptography",
"impacket"
]
},
"certipy": {
"version": "4.8.2.r0.g2780d53-6",
"description": "Active Directory Certificate Services enumeration and abuse.",
"dependencies": [
"python",
"python-asn1crypto",
"python-cryptography",
"impacket",
"python-ldap3",
"python-pyasn1",
"python-dnspython",
"python-dsinternals",
"python-pyopenssl",
"python-requests",
"python-requests-ntlm",
"python-pycryptodome",
"python-unicrypto",
"python-charset-normalizer",
"python-future",
"python-chardet",
"ldapdomaindump"
]
},
"certsync": {
"version": "0.1.6-4",
"description": "Dump NTDS remotely without DRSUAPI: using golden certificate and UnPAC the hash.",
"dependencies": [
"python",
"python-tqdm",
"certipy"
]
},
"cewl": {
"version": "189.447ccc1-2",
"description": "A custom word list generator.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"cflow": {
"version": "1.7-1",
"description": "A C program flow analyzer.",
"dependencies": []
},
"chainsaw-debug": {
"version": "v2.7.3.r6.g5d908fd-1",
"description": "Detached debugging symbols for chainsaw",
"dependencies": []
},
"chainsaw": {
"version": "v2.7.3.r6.g5d908fd-1",
"description": "A powerful \u2018first-response\u2019 capability to quickly identify threats within Windows event logs.",
"dependencies": []
},
"chameleon": {
"version": "29.4414287-4",
"description": "A tool for evading Proxy categorisation.",
"dependencies": [
"python",
"python-requests",
"python-dateutil",
"python-beautifulsoup4"
]
},
"chameleonmini": {
"version": "613.ad0eece-2",
"description": "Official repository of ChameleonMini, a freely programmable, portable tool for NFC security analysis that can emulate and clone contactless cards, read RFID tags and sniff/log RF data.",
"dependencies": [
"python",
"python-argparse",
"python-colorama",
"python-pyserial"
]
},
"chameleonmini-debug": {
"version": "613.ad0eece-2",
"description": "Detached debugging symbols for chameleonmini",
"dependencies": []
},
"changeme": {
"version": "266.89f59d4-11",
"description": "A default credential scanner.",
"dependencies": [
"python",
"python-python-libnmap",
"python-lxml",
"python-netaddr",
"python-requests",
"python-nose",
"python-schema",
"python-logutils",
"python-cerberus",
"python-tabulate",
"python-paramiko",
"python-yaml",
"python-sqlalchemy",
"python-mock",
"python-pysnmp",
"python-shodan",
"python-memcached",
"python-redis",
"python-pymongo",
"python-jinja",
"python-selenium",
"python-pyodbc"
]
},
"chankro": {
"version": "21.7b6e844-3",
"description": "Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (p.e. reverse shell) bypassing disable_functions & open_basedir).",
"dependencies": [
"python2",
"python2-argparse"
]
},
"chankro-debug": {
"version": "21.7b6e844-3",
"description": "Detached debugging symbols for chankro",
"dependencies": []
},
"chaos-client": {
"version": "283.17a19d7-1",
"description": "Go client to communicate with Chaos dataset API.",
"dependencies": [
"glibc"
]
},
"chaos-client-debug": {
"version": "283.17a19d7-1",
"description": "Detached debugging symbols for chaos-client",
"dependencies": []
},
"chaosmap": {
"version": "1.3-5",
"description": "An information gathering tool and dns / whois / web server scanner",
"dependencies": [
"python2"
]
},
"chaosreader": {
"version": "0.94-6",
"description": "A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.",
"dependencies": [
"perl"
]
},
"chapcrack": {
"version": "17.ae2827f-7",
"description": "A tool for parsing and decrypting MS-CHAPv2 network handshakes.",
"dependencies": [
"python2",
"python2-passlib",
"python2-dpkt",
"python2-m2crypto"
]
},
"cheat-sh": {
"version": "6-1",
"description": "The only cheat sheet you need.",
"dependencies": [
"python",
"python-virtualenv",
"git"
]
},
"checkiban": {
"version": "0.2-3",
"description": "Checks the validity of an International Bank Account Number (IBAN).",
"dependencies": []
},
"checkov": {
"version": "3.2.372.r1.g8b0f288ae-1",
"description": "Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"check-weak-dh-ssh": {
"version": "0.1-4",
"description": "Debian OpenSSL weak client Diffie-Hellman Exchange checker.",
"dependencies": [
"perl",
"perl-net-packet",
"perl-data-dumper",
"perl-getopt-long",
"perl-math-bigint-gmp"
]
},
"chiasm-shell": {
"version": "33.e20ed9f-19",
"description": "Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone.",
"dependencies": [
"python",
"python-keystone",
"python-capstone"
]
},
"chipsec": {
"version": "5:1.13.9.r9.gbe74600-1",
"description": "Platform Security Assessment Framework.",
"dependencies": [
"dkms",
"libelf",
"nasm",
"python",
"python-lxml"
]
},
"chipsec-debug": {
"version": "5:1.13.9.r9.gbe74600-1",
"description": "Detached debugging symbols for chipsec",
"dependencies": []
},
"chiron": {
"version": "48.524abe1-3",
"description": "An all-in-one IPv6 Penetration Testing Framework.",
"dependencies": [
"python2",
"python2-scapy",
"python2-ipaddr",
"python2-netaddr"
]
},
"chisel": {
"version": "239.ab8f06a-1",
"description": "A fast TCP tunnel over HTTP.",
"dependencies": []
},
"chisel-debug": {
"version": "239.ab8f06a-1",
"description": "Detached debugging symbols for chisel",
"dependencies": []
},
"chkrootkit": {
"version": "0.58b-1",
"description": "Checks for rootkits on a system.",
"dependencies": []
},
"chopshop": {
"version": "444.8bdd393-3",
"description": "Protocol Analysis/Decoder Framework.",
"dependencies": [
"python2",
"python2-pynids",
"python2-pymongo",
"python2-yaraprocessor",
"python2-m2crypto",
"python2-pylibemu",
"python2-dnslib"
]
},
"choronzon": {
"version": "4.d702c31-4",
"description": "An evolutionary knowledge-based fuzzer.",
"dependencies": [
"python2",
"python2-sortedcontainers"
]
},
"chownat": {
"version": "0.08b-8",
"description": "Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other",
"dependencies": [
"perl",
"perl-digest-md4"
]
},
"chrome-decode": {
"version": "0.1-7",
"description": "Chrome web browser decoder tool that demonstrates recovering passwords.",
"dependencies": []
},
"chromefreak": {
"version": "24.12745b1-6",
"description": "A Cross-Platform Forensic Framework for Google Chrome",
"dependencies": [
"python2",
"python2-simplejson",
"python2-pysqlite"
]
},
"chromensics": {
"version": "1.0-4",
"description": "A Google chrome forensics tool.",
"dependencies": []
},
"chw00t": {
"version": "39.1fd1016-1",
"description": "Unices chroot breaking tool.",
"dependencies": []
},
"cidr2range": {
"version": "1.0-4",
"description": "Script for listing the IP addresses contained in a CIDR netblock.",
"dependencies": [
"perl",
"perl-net-cidr"
]
},
"cintruder": {
"version": "14.f8a3f12-3",
"description": "An automatic pentesting tool to bypass captchas.",
"dependencies": [
"python2",
"python2-pycurl",
"python2-lxml",
"python2-pillow6"
]
},
"cipherscan": {
"version": "421.5866911-3",
"description": "A very simple way to find out which SSL ciphersuites are supported by a target.",
"dependencies": [
"bash",
"python2",
"openssl"
]
},
"cipherscan-debug": {
"version": "421.5866911-3",
"description": "Detached debugging symbols for cipherscan",
"dependencies": []
},
"ciphertest": {
"version": "22.e33eb4a-1",
"description": "A better SSL cipher checker using gnutls.",
"dependencies": []
},
"ciphr": {
"version": "127.5da7137-13",
"description": "A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"cirt-fuzzer": {
"version": "1.0-6",
"description": "A simple TCP/UDP protocol fuzzer.",
"dependencies": [
"perl",
"perl-algorithm-generatesequence",
"perl-net-ssleay"
]
},
"cisco5crack": {
"version": "2.c4b228c-4",
"description": "Crypt and decrypt the cisco enable 5 passwords.",
"dependencies": []
},
"cisco5crack-debug": {
"version": "2.c4b228c-4",
"description": "Detached debugging symbols for cisco5crack",
"dependencies": []
},
"cisco7crack": {
"version": "2.f1c21dd-2",
"description": "Crypt and decrypt the cisco enable 7 passwords.",
"dependencies": []
},
"cisco-auditing-tool": {
"version": "1-8",
"description": "Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.",
"dependencies": [
"perl"
]
},
"cisco-global-exploiter": {
"version": "1.3-5",
"description": "A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.",
"dependencies": []
},
"cisco-ocs": {
"version": "0.2-5",
"description": "Cisco Router Default Password Scanner.",
"dependencies": []
},
"cisco-router-config": {
"version": "1.1-6",
"description": "Tools to copy and merge Cisco Routers Configuration.",
"dependencies": [
"perl",
"perl-cisco-copyconfig"
]
},
"ciscos": {
"version": "1.3-2",
"description": "Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.",
"dependencies": []
},
"cisco-scanner": {
"version": "0.2-1",
"description": "Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris.",
"dependencies": []
},
"cisco-snmp-enumeration": {
"version": "10.ad06f57-3",
"description": "Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.",
"dependencies": [
"bash",
"metasploit",
"net-snmp",
"john",
"screen"
]
},
"cisco-snmp-slap": {
"version": "5.daf0589-5",
"description": "IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"cisco-torch": {
"version": "0.4b-12",
"description": "Cisco Torch mass scanning, fingerprinting, and exploitation tool.",
"dependencies": [
"perl",
"perl-net-telnet",
"perl-net-snmp",
"perl-net-ssh-perl",
"perl-net-ssleay"
]
},
"citadel": {
"version": "95.3b1adbc-1",
"description": "A library of OSINT tools.",
"dependencies": [
"python",
"python-colorama"
]
},
"cjexploiter": {
"version": "1:2.d1caa21-1",
"description": "Drag and Drop ClickJacking exploit development assistance tool.",
"dependencies": []
},
"ckbcomp": {
"version": "1.207-2",
"description": "Compile a XKB keyboard description to a keymap suitable for loadkeys or kbdcontrol.",
"dependencies": [
"perl"
]
},
"clair": {
"version": "2030.e45fbf0e-1",
"description": "Vulnerability Static Analysis for Containers.",
"dependencies": [
"glibc",
"rpm-tools"
]
},
"clair-debug": {
"version": "2030.e45fbf0e-1",
"description": "Detached debugging symbols for clair",
"dependencies": []
},
"clairvoyance": {
"version": "2.5.2-7",
"description": "Obtain GraphQL API Schema even if the introspection is not enabled.",
"dependencies": [
"python",
"python-asyncio",
"python-aiohttp",
"python-rich"
]
},
"clamscanlogparser": {
"version": "1-1",
"description": "This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.",
"dependencies": []
},
"climber": {
"version": "30.5530a78-5",
"description": "Check UNIX/Linux systems for privilege escalation.",
"dependencies": [
"python2",
"python2-pycryptodome",
"python2-mako",
"python2-paramiko",
"python2-exscript"
]
},
"cloakify": {
"version": "117.f45c3b3-3",
"description": "Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection.",
"dependencies": [
"python2"
]
},
"cloud-buster": {
"version": "194.b55e4a1-8",
"description": "A tool that checks Cloudflare enabled sites for origin IP leaks.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-dnspython",
"python-requests",
"openssl"
]
},
"cloud_enum": {
"version": "0.7.r10.gd3c292c-1",
"description": "Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.",
"dependencies": [
"python",
"python-dnspython",
"python-requests",
"python-requests-futures"
]
},
"cloudfail": {
"version": "79.7982c7d-1",
"description": "Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-colorama",
"python-beautifulsoup4",
"python-pysocks",
"python-pyopenssl",
"python-win_inet_pton",
"python-dnspython"
]
},
"cloudflare-enum": {
"version": "10.412387f-4",
"description": "Cloudflare DNS Enumeration Tool for Pentesters.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-requests",
"python2-beautifulsoup4"
]
},
"cloudget": {
"version": "64.cba10b1-3",
"description": "Python script to bypass cloudflare from command line. Built upon cfscrape module.",
"dependencies": [
"python2",
"python2-cfscrape"
]
},
"cloudlist": {
"version": "773.29d9398-1",
"description": "A tool for listing Assets from multiple Cloud Providers.",
"dependencies": [
"glibc"
]
},
"cloudlist-debug": {
"version": "773.29d9398-1",
"description": "Detached debugging symbols for cloudlist",
"dependencies": []
},
"cloudmare": {
"version": "108.9c5a39f-4",
"description": "A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS.",
"dependencies": [
"python",
"python-pip",
"python-certifi",
"python-lxml",
"python-backoff",
"python-beautifulsoup4"
]
},
"cloudsploit": {
"version": "6576.6802dd4e6-1",
"description": "AWS security scanning checks.",
"dependencies": [
"nodejs"
]
},
"cloudunflare": {
"version": "14.b91a8a7-1",
"description": "Reconnaissance Real IP address for Cloudflare Bypass.",
"dependencies": [
"bash",
"curl",
"bind-tools",
"whois"
]
},
"clusterd": {
"version": "143.d190b2c-5",
"description": "Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.",
"dependencies": [
"python2",
"python2-requests",
"java-environment"
]
},
"cminer": {
"version": "25.d766f7e-1",
"description": "A tool for enumerating the code caves in PE files.",
"dependencies": []
},
"cmospwd": {
"version": "5.1-1",
"description": "Decrypts password stored in CMOS used to access BIOS setup.",
"dependencies": [
"glibc"
]
},
"cmseek": {
"version": "382.20f9780-5",
"description": "CMS (Content Management Systems) Detection and Exploitation suite.",
"dependencies": [
"python",
"python-requests"
]
},
"cms-explorer": {
"version": "15.23b58cd-4",
"description": "Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running.",
"dependencies": [
"perl",
"perl-libwhisker2"
]
},
"cms-few": {
"version": "0.1-5",
"description": "Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.",
"dependencies": [
"python2"
]
},
"cmsfuzz": {
"version": "5.6be5a98-3",
"description": "Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke.",
"dependencies": [
"ruby"
]
},
"cmsmap": {
"version": "1:8.59dd0e2-10",
"description": "A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.",
"dependencies": [
"python",
"exploitdb"
]
},
"cmsscan": {
"version": "43.f060b4b-7",
"description": "CMS scanner to identify and find vulnerabilities for Wordpress, Drupal, Joomla, vBulletin.",
"dependencies": [
"python",
"python-flask",
"python-requests",
"gunicorn",
"python-fake-useragent",
"droopescan",
"vbscan",
"joomscan",
"wpscan",
"python-flask-basicauth"
]
},
"cmsscanner": {
"version": "0.13.8.82.g7a5aef3-1",
"description": "CMS Scanner Framework.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"cnamulator": {
"version": "5.4667c68-3",
"description": "A phone CNAM lookup utility using the OpenCNAM API.",
"dependencies": [
"glibc"
]
},
"cntlm": {
"version": "4.b35d55c-2",
"description": "An NTLM, NTLM2SR, and NTLMv2 authenticating HTTP proxy.",
"dependencies": []
},
"codeql": {
"version": "1:2.8.1-1",
"description": "The CLI tool for GitHub CodeQL",
"dependencies": [
"java-runtime-headless",
"bash"
]
},
"codetective": {
"version": "45.52b91f1-2",
"description": "A tool to determine the crypto/encoding algorithm used according to traces of its representation.",
"dependencies": [
"python2"
]
},
"coercer": {
"version": "2.4.3-4",
"description": "Coerce a Windows server to authenticate on an arbitrary machine through 15 methods.",
"dependencies": [
"python",
"impacket",
"python-xlsxwriter"
]
},
"comission": {
"version": "203.67b890e-8",
"description": "WhiteBox CMS analysis.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-lxml",
"python-beautifulsoup4",
"python-openpyxl",
"python-checksumdir",
"python-xlsxwriter"
]
},
"commentor": {
"version": "20.4582674-1",
"description": "Extract all comments from the specified URL resource.",
"dependencies": [
"curl",
"tidy",
"xmlstarlet"
]
},
"commix": {
"version": "2218.bf8aa0f8-1",
"description": "Automated All-in-One OS Command Injection and Exploitation Tool.",
"dependencies": [
"python",
"python-scapy"
]
},
"commonspeak": {
"version": "36.f0aad23-1",
"description": "Leverages publicly available datasets from Google BigQuery to generate wordlists.",
"dependencies": []
},
"complemento": {
"version": "0.7.6-4",
"description": "A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever",
"dependencies": []
},
"compp": {
"version": "1.0.5-7",
"description": "Company Passwords Profiler helps making a bruteforce wordlist for a targeted company.",
"dependencies": [
"python",
"python-colorama"
]
},
"configpush": {
"version": "0.8.5-3",
"description": "This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.",
"dependencies": []
},
"conn": {
"version": "1.0.39-1",
"description": "Small C library usefull to easy build ipv4/ipv6 network daemons/clients.",
"dependencies": [
"glibc"
]
},
"conpass": {
"version": "0.1.1-4",
"description": "Password spraying in AD environment avoing account locking.",
"dependencies": [
"python",
"python-ldap",
"impacket-ba",
"python-rich"
]
},
"conpot": {
"version": "0.6.0-13",
"description": "ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.",
"dependencies": [
"python-gevent",
"python-pysnmp",
"python-pysmi",
"python-lxml",
"python-bottle",
"python-jinja",
"python-beautifulsoup4",
"python-requests",
"python-sphinx",
"python-libtaxii",
"python-xlrd",
"python-crc16",
"python-natsort",
"python-scapy",
"python-enum-compat",
"hpfeeds",
"python-modbus-tk",
"python-stix-validator",
"python-stix",
"python-crypto",
"python-cybox",
"python-cybox",
"python-pyghmi",
"python-mixbox",
"python-cpppo",
"python-pytest",
"python-fs",
"python-slugify",
"python-tftpy",
"python-freezegun",
"python-tox",
"python-weakrefmethod"
]
},
"conscan": {
"version": "1.2-5",
"description": "A blackbox vulnerability scanner for the Concre5 CMS.",
"dependencies": [
"python2",
"python2-wget",
"python2-lxml"
]
},
"cook": {
"version": "1:v2.2.1.r13.gbabf5ba-1",
"description": "Easily create word's permutation and combination to generate complex wordlists and passwords.",
"dependencies": []
},
"cook-debug": {
"version": "1:v2.2.1.r13.gbabf5ba-1",
"description": "Detached debugging symbols for cook",
"dependencies": []
},
"cookie-cadger": {
"version": "1.08-2",
"description": "An auditing tool for Wi-Fi or wired Ethernet connections.",
"dependencies": [
"java-environment",
"wireshark-cli"
]
},
"cookiejar": {
"version": "0.0.3-8",
"description": "Cookiecutter templates discovery and management.",
"dependencies": [
"python",
"python-pager",
"python-cookiecutter"
]
},
"corscanner": {
"version": "99.593043f-7",
"description": "Fast CORS misconfiguration vulnerabilities scanner.",
"dependencies": [
"python",
"python-requests",
"python-requests-file",
"python-gevent",
"python-tldextract",
"python-argparse",
"python-colorama",
"python-future"
]
},
"corstest": {
"version": "10.beffd0b-9",
"description": "A simple CORS misconfigurations checker.",
"dependencies": [
"python",
"python-argparse"
]
},
"corsy": {
"version": "69.2985ae2-7",
"description": "CORS Misconfiguration Scanner.",
"dependencies": [
"python",
"python-tld",
"python-requests"
]
},
"cottontail": {
"version": "93.b7f5222-7",
"description": "Capture all RabbitMQ messages being sent through a broker.",
"dependencies": [
"python",
"python-coloredlogs",
"python-pika",
"python-requests",
"python-urllib3",
"python-verboselogs"
]
},
"country-ip-blocks": {
"version": "5098.e0f46c1-1",
"description": "CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly.",
"dependencies": []
},
"cower": {
"version": "18-1",
"description": "A simple AUR agent with a pretentious name.",
"dependencies": [
"curl",
"pacman",
"yajl"
]
},
"cpfinder": {
"version": "0.1-4",
"description": "Simple script that looks for administrative web interfaces.",
"dependencies": [
"perl",
"perl-http-message",
"perl-libwww"
]
},
"cpp2il": {
"version": "1:2022.0.7.r17.g20ccab2-1",
"description": "A tool to reverse unity's IL2PP toolchain",
"dependencies": [
"dotnet-runtime-6.0"
]
},
"cpp2il-debug": {
"version": "1:2022.0.7.r17.g20ccab2-1",
"description": "Detached debugging symbols for cpp2il",
"dependencies": []
},
"cpptest": {
"version": "2.0.0-1",
"description": "A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.",
"dependencies": [
"gcc-libs"
]
},
"cpyrit-cuda": {
"version": "0.5.0-3",
"description": "The famous WPA precomputed cracker for NVIDIA-CUDA.",
"dependencies": [
"openssl",
"python2",
"zlib",
"libpcap",
"nvidia"
]
},
"cpyrit-cuda-debug": {
"version": "0.5.0-3",
"description": "Detached debugging symbols for cpyrit-cuda",
"dependencies": []
},
"cpyrit-opencl": {
"version": "0.4.0-2",
"description": "Pyrit support for Nvidia-CUDA.",
"dependencies": []
},
"cr3dov3r": {
"version": "47.4e1f784-4",
"description": "Search for public leaks for email addresses + check creds against 16 websites.",
"dependencies": [
"python",
"python-argparse",
"python-mechanicalsoup",
"python-pyopenssl",
"python-requests"
]
},
"crabstick": {
"version": "47.bb7827f-9",
"description": "Automatic remote/local file inclusion vulnerability analysis and exploit tool.",
"dependencies": [
"python",
"python-paramiko",
"python-urllib3",
"python-requests",
"python-docopt",
"python-beautifulsoup4"
]
},
"cracken": {
"version": "v1.0.1.r0.g7a325ff-1",
"description": "A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust.",
"dependencies": []
},
"crackhor": {
"version": "2.ae7d83f-1",
"description": "A Password cracking utility.",
"dependencies": []
},
"crackle": {
"version": "111.d83b4b6-1",
"description": "Crack and decrypt BLE encryption.",
"dependencies": [
"libpcap"
]
},
"crackmapexec": {
"version": "3:v6.0.1.r198.gda472cb-5",
"description": "A swiss army knife for pentesting Windows/Active Directory environments.",
"dependencies": [
"netexec"
]
},
"crackmapexec-pingcastle": {
"version": "9.16340d2-1",
"description": "NetExec & CrackMapExec module that execute PingCastle on a remote machine.",
"dependencies": [
"crackmapexec"
]
},
"crackpkcs12": {
"version": "0.2.10.11.c7dedb1-1",
"description": "A multithreaded program to crack PKCS#12 files (p12 and pfx extensions).",
"dependencies": []
},
"crackpkcs12-debug": {
"version": "0.2.10.11.c7dedb1-1",
"description": "Detached debugging symbols for crackpkcs12",
"dependencies": []
},
"crackq": {
"version": "48.89b7318-4",
"description": "Hashcrack.org GPU-accelerated password cracker.",
"dependencies": [
"python2",
"python2-simplejson"
]
},
"crackql": {
"version": "1.0.r53.gac26a44-6",
"description": "GraphQL password brute-force and fuzzing utility",
"dependencies": [
"python",
"python-virtualenv"
]
},
"crackserver": {
"version": "33.e5763ab-4",
"description": "An XMLRPC server for password cracking.",
"dependencies": [
"python2",
"rcracki_mt",
"john",
"hashcat",
"ike-scan",
"pyrit"
]
},
"crawlic": {
"version": "51.739fe2b-4",
"description": "Web recon tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server).",
"dependencies": [
"python2",
"python2-requests",
"python2-simplejson"
]
},
"creak": {
"version": "41.a6c011f-3",
"description": "Poison, reset, spoof, redirect MITM script.",
"dependencies": [
"python2",
"python2-pypcap",
"python2-dpkt",
"python2-scapy",
"python2-pydnet"
]
},
"create_ap": {
"version": "265.462c09f-1",
"description": "A shell script to create a NATed/Bridged Software Access Point.",
"dependencies": [
"bash",
"hostapd",
"iproute2",
"iw",
"dnsmasq",
"iptables",
"util-linux",
"procps-ng",
"which"
]
},
"creddump": {
"version": "3.ed95e1a-3",
"description": "A python tool to extract various credentials and secrets from Windows registry hives.",
"dependencies": [
"python2",
"python2-pycryptodome"
]
},
"credmap": {
"version": "116.d862247-3",
"description": "The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse.",
"dependencies": [
"python2",
"python2-lxml"
]
},
"credmaster": {
"version": "205.b3c2a5b-4",
"description": "Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"creds": {
"version": "1:17.1ec8297-7",
"description": "Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"credsniper": {
"version": "21.f52461b-8",
"description": "Phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.",
"dependencies": [
"gnupg",
"python",
"python-flask",
"python-mechanicalsoup",
"python-pyopenssl"
]
},
"creepy": {
"version": "1:137.9f60449-5",
"description": "A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.",
"dependencies": [
"python2",
"python2-tweepy",
"python2-osmgpsmap",
"python2-flickrapi",
"python2-beautifulsoup3",
"python2-exiv2",
"python2-configobj",
"python2-simplejson",
"python2-yapsy",
"python2-pyqt4",
"pyqt4-common"
]
},
"cribdrag": {
"version": "5.2d27dbf-3",
"description": "An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys.",
"dependencies": [
"python2"
]
},
"crlf-injector": {
"version": "9.bd6db06-3",
"description": "A python script for testing CRLF injecting issues.",
"dependencies": [
"python2",
"python2-netaddr",
"python2-argparse",
"python2-requests"
]
},
"crlfuzz": {
"version": "62.7a442bb-1",
"description": "A fast tool to scan CRLF vulnerability written in Go.",
"dependencies": []
},
"crosslinked": {
"version": "1:49.2ae8d7b-4",
"description": "LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping.",
"dependencies": [
"python",
"python-argparse",
"python-beautifulsoup4",
"python-urllib3",
"python-requests",
"python-unidecode",
"python-taser"
]
},
"crowbar": {
"version": "1:v4.2.r1.g4b563dc-4",
"description": "Brute forcing tool that can be used during penetration tests.",
"dependencies": [
"python",
"python-paramiko",
"python-python-nmap",
"openvpn",
"openssh",
"freerdp",
"tigervnc"
]
},
"crozono": {
"version": "1:5.6a51669-5",
"description": "A modular framework designed to automate the penetration testing of wireless networks from drones and such unconventional devices.",
"dependencies": [
"python",
"python-colorama",
"python-pyfiglet",
"python-poormanslogging",
"python-pexpect",
"aircrack-ng"
]
},
"crunch": {
"version": "3.6-2",
"description": "A wordlist generator for all combinations/permutations of a given character set.",
"dependencies": [
"glibc"
]
},
"crypthook": {
"version": "18.690dcae-1",
"description": "TCP/UDP symmetric encryption tunnel wrapper.",
"dependencies": [
"openssl"
]
},
"cryptohazemultiforcer": {
"version": "1.31a-2",
"description": "High performance multihash brute forcer with CUDA support.",
"dependencies": []
},
"cryptonark": {
"version": "0.5.7-1",
"description": "SSL security checker.",
"dependencies": [
"perl-io-socket-ssl",
"perl-tie-hash-indexed",
"perl-modern-perl",
"perl-mozilla-ca"
]
},
"csdr": {
"version": "0.18.2.r68.g1f15b8c-1",
"description": "A simple DSP library and command-line tool for Software Defined Radio.",
"dependencies": [
"fftw",
"libsamplerate"
]
},
"csdr-debug": {
"version": "0.18.2.r68.g1f15b8c-1",
"description": "Detached debugging symbols for csdr",
"dependencies": []
},
"csrftester": {
"version": "1.0-4",
"description": "The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.",
"dependencies": [
"java-environment"
]
},
"ct-exposer": {
"version": "24.71252ac-7",
"description": "An OSINT tool that discovers sub-domains by searching Certificate Transparency logs.",
"dependencies": [
"python",
"python-gevent",
"python-greenlet",
"python-requests",
"python-urllib3"
]
},
"ctf-party": {
"version": "v3.0.0.r41.gc728a6c-1",
"description": "A CLI tool & library to enhance and speed up script/exploit writing for CTF players.",
"dependencies": [
"ruby",
"ruby-docopt"
]
},
"ctunnel": {
"version": "0.7-1",
"description": "Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.",
"dependencies": []
},
"ctypes-sh": {
"version": "158.b79e401-1",
"description": "Allows you to call routines in shared libraries from within bash.",
"dependencies": [
"bash",
"elfutils",
"libelf",
"libdwarf",
"libffi"
]
},
"ctypes-sh-debug": {
"version": "158.b79e401-1",
"description": "Detached debugging symbols for ctypes-sh",
"dependencies": []
},
"cubicsdr": {
"version": "0.2.7-1",
"description": "Cross-Platform Software-Defined Radio Application.",
"dependencies": [
"gcc-libs",
"glibc",
"hamlib",
"hicolor-icon-theme",
"libglvnd",
"libpulse",
"liquid-dsp",
"soapysdr",
"wxwidgets-common",
"wxwidgets-gtk3",
"freeglut"
]
},
"cubicsdr-debug": {
"version": "0.2.7-1",
"description": "Detached debugging symbols for cubicsdr",
"dependencies": []
},
"cuckoo": {
"version": "2.0.7-10",
"description": "Automated malware analysis system.",
"dependencies": [
"python2",
"python2-sqlalchemy",
"python2-dpkt",
"python2-jinja",
"python2-magic",
"python2-pydeep",
"libvirt",
"python2-bottle",
"python2-pefile",
"python2-pymongo",
"tcpdump",
"yara",
"python2-yara",
"python2-alembic",
"python2-beautifulsoup4",
"python2-cffi",
"python2-chardet",
"python2-django",
"python2-ecdsa",
"python2-enum34",
"python2-flask",
"python2-httpreplay",
"python2-idna",
"python2-ipaddress",
"python2-itsdangerous",
"python2-mako",
"python2-markupsafe",
"python2-ndg-httpsclient",
"python2-pyasn1",
"python2-pycparser",
"python2-pyopenssl",
"python2-dateutil",
"python2-requests",
"python2-six",
"python2-werkzeug",
"python2-tlslite-ng",
"python2-wakeonlan",
"python2-sflock",
"python2-scapy",
"python2-wol",
"python2-egghatch",
"python2-peepdf",
"python2-gevent",
"python2-flask-sqlalchemy"
]
},
"cuckoo-debug": {
"version": "2.0.7-10",
"description": "Detached debugging symbols for cuckoo",
"dependencies": []
},
"cudahashcat": {
"version": "2.01-2",
"description": "Worlds fastest WPA cracker with dictionary mutation engine.",
"dependencies": []
},
"cupp": {
"version": "77.56547fd-3",
"description": "Common User Password Profiler",
"dependencies": [
"python2"
]
},
"cutycapt": {
"version": "3:10-5",
"description": "A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.",
"dependencies": []
},
"cve-api": {
"version": "170.8e9c247-5",
"description": "Unofficial api for cve.mitre.org.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt",
"libxml2"
]
},
"cvechecker": {
"version": "4.0-1",
"description": "The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.",
"dependencies": [
"libconfig>=1.3",
"sqlite3",
"wget",
"libxslt",
"libbsd"
]
},
"cvemap-debug": {
"version": "v0.0.7.r305.g5338b2c-1",
"description": "Detached debugging symbols for cvemap",
"dependencies": []
},
"cvemap": {
"version": "v0.0.7.r305.g5338b2c-1",
"description": "CLI tool designed to provide a structured and easily navigable interface to various vulnerability databases.",
"dependencies": []
},
"cve-search": {
"version": "v5.1.0.r6.g8926109-1",
"description": "A tool to perform local searches for known vulnerabilities.",
"dependencies": [
"mongodb",
"python",
"python-click",
"python-dateutil",
"python-flask",
"python-flask-login",
"python-itsdangerous",
"python-jinja",
"redis",
"python-lxml",
"python-passlib",
"python-pymongo",
"python-pytz",
"python-redis",
"python-requests",
"python-six",
"python-tornado",
"python-werkzeug",
"python-whoosh",
"python-xlrd",
"python-feedformater",
"python-flask-pymongo",
"python-requirements-parser"
]
},
"cybercrowl": {
"version": "111.f7cac52-2",
"description": "A Python Web path scanner tool.",
"dependencies": [
"python2",
"python2-requests",
"python2-requests-file",
"python2-idna",
"python2-fake-useragent",
"python2-requests-ntlm",
"python2-setuptools"
]
},
"cyberscan": {
"version": "75.ca85794-3",
"description": "A Network Pentesting Tool.",
"dependencies": [
"python2",
"python2-pygeoip",
"python2-argparse",
"python2-asn1crypto",
"python2-scapy"
]
},
"cymothoa": {
"version": "1-9",
"description": "A stealth backdooring tool, that inject backdoor's shellcode into an existing process.",
"dependencies": []
},
"cython0": {
"version": "0.29.37.1-1",
"description": "C-Extensions for Python (legacy version).",
"dependencies": [
"python"
]
},
"cython0-debug": {
"version": "0.29.37.1-1",
"description": "Detached debugging symbols for cython0",
"dependencies": []
},
"cython2": {
"version": "0.29.32-3",
"description": "The Cython compiler for writing C extensions for the Python language.",
"dependencies": [
"python2",
"python2-setuptools"
]
},
"cython2-debug": {
"version": "0.29.32-3",
"description": "Detached debugging symbols for cython2",
"dependencies": []
},
"dagon": {
"version": "244.f065d7b-2",
"description": "Advanced Hash Manipulation.",
"dependencies": [
"python2",
"python2-colorlog",
"python2-requests",
"python2-passlib",
"python2-pysha3",
"python2-bcrypt",
"python2-pydes"
]
},
"dalfox": {
"version": "1592.2e19e44-1",
"description": "Parameter Analysis and XSS Scanning tool.",
"dependencies": [
"glibc"
]
},
"dalfox-debug": {
"version": "1592.2e19e44-1",
"description": "Detached debugging symbols for dalfox",
"dependencies": []
},
"damm": {
"version": "32.60e7ec7-3",
"description": "Differential Analysis of Malware in Memory.",
"dependencies": [
"python2"
]
},
"daredevil": {
"version": "42.81cb57f-1",
"description": "A tool to perform (higher-order) correlation power analysis attacks (CPA).",
"dependencies": [
"openmp"
]
},
"darkarmour": {
"version": "4.f10228a-7",
"description": "Store and execute an encrypted windows binary from inside memory, without a single bit touching disk.",
"dependencies": [
"python",
"python-argparse",
"mingw-w64-binutils",
"mingw-w64-headers",
"mingw-w64-crt",
"mingw-w64-winpthreads",
"mingw-w64-gcc",
"upx",
"osslsigncode"
]
},
"darkbing": {
"version": "0.1-5",
"description": "A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.",
"dependencies": [
"python2",
"python2-lxml"
]
},
"darkd0rk3r": {
"version": "1.0-6",
"description": "Python script that performs dork searching and searches for local file inclusion and SQL injection errors.",
"dependencies": [
"python2"
]
},
"dark-dork-searcher": {
"version": "1.0-5",
"description": "Dark-Dork Searcher.",
"dependencies": []
},
"darkdump": {
"version": "54.b71776b-4",
"description": "Search The Deep Web Straight From Your Terminal.",
"dependencies": [
"python",
"python-requests",
"python-termcolor",
"python-argparse",
"python-beautifulsoup4"
]
},
"darkjumper": {
"version": "5.8-7",
"description": "This tool will try to find every website that host at the same server at your target.",
"dependencies": [
"perl",
"python2"
]
},
"darkmysqli": {
"version": "1.6-5",
"description": "Multi-Purpose MySQL Injection Tool",
"dependencies": [
"python2"
]
},
"darkscrape": {
"version": "68.2ca0e37-7",
"description": "OSINT Tool For Scraping Dark Websites.",
"dependencies": [
"python",
"python-xlrd",
"python-beautifulsoup4",
"python-requests",
"python-face-recognition",
"tor"
]
},
"darkspiritz": {
"version": "1:6.4d23e94-4",
"description": "A penetration testing framework for Linux, MacOS, and Windows systems.",
"dependencies": [
"python",
"impacket",
"python-pysmb",
"python-pycryptodomex",
"python-paramiko",
"python-scapy",
"python-requests",
"python-terminaltables"
]
},
"datajackproxy": {
"version": "42.f75f3a3-8",
"description": "A proxy which allows you to intercept TLS traffic in native x86 applications across platform.",
"dependencies": [
"python",
"python-frida"
]
},
"datasploit": {
"version": "1:367.a270d50-5",
"description": "Performs automated OSINT and more.",
"dependencies": [
"python2",
"python2-requests",
"python2-tweepy",
"python2-dnspython",
"python2-pymongo",
"python2-python-whois",
"python2-python-wappalyzer",
"python2-celery",
"python2-beautifulsoup4",
"python2-django",
"python2-shodan",
"python2-termcolor",
"python2-ipwhois",
"python2-clearbit",
"python2-json2html",
"python2-future",
"python2-configobj",
"python2-pytz",
"python2-html5lib",
"python2-praw",
"python2-billiard",
"python2-anyjson",
"python2-idna",
"python2-netaddr",
"python2-requests-file"
]
},
"davoset": {
"version": "1.3.7-5",
"description": "A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.",
"dependencies": [
"perl",
"perl-io-socket-socks"
]
},
"davscan": {
"version": "30.701f967-4",
"description": "Fingerprints servers, finds exploits, scans WebDAV.",
"dependencies": [
"python2",
"python2-requests",
"python2-pysqlite",
"python2-lxml",
"python2-beautifulsoup4"
]
},
"davtest": {
"version": "3.a282c58-4",
"description": "Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target.",
"dependencies": [
"perl",
"perl-http-dav"
]
},
"dawnscanner": {
"version": "1:v2.2.0.r15.g0d647fc-3",
"description": "A static analysis security scanner for ruby written web applications.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"dbd": {
"version": "61.8cf5350-1",
"description": "A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.",
"dependencies": []
},
"dbpwaudit": {
"version": "0.8-7",
"description": "A Java tool that allows you to perform online audits of password quality for several database engines.",
"dependencies": [
"java-environment"
]
},
"dbusmap": {
"version": "16.6bb2831-2",
"description": "Simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.",
"dependencies": [
"libxml2",
"procps-ng",
"glib2"
]
},
"dc3dd": {
"version": "7.2.646-1",
"description": "A patched version of dd that includes a number of features useful for computer forensics.",
"dependencies": [
"perl-locale-gettext"
]
},
"dcdetector": {
"version": "0.0.1.r52.g2e69244-3",
"description": "Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.",
"dependencies": [
"ruby",
"ruby-paint",
"ruby-docopt"
]
},
"dcfldd": {
"version": "1.7.1-2",
"description": "DCFL (DoD Computer Forensics Lab) dd replacement with hashing.",
"dependencies": [
"glibc"
]
},
"dcfldd-debug": {
"version": "1.7.1-2",
"description": "Detached debugging symbols for dcfldd",
"dependencies": []
},
"dcrawl": {
"version": "7.3273c35-3",
"description": "Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.",
"dependencies": [
"glibc"
]
},
"ddosify": {
"version": "1:v1.7.2.r2.g1639885-1",
"description": "High-performance load testing tool, written in Golang.",
"dependencies": [
"glibc"
]
},
"ddosify-debug": {
"version": "1:v1.7.2.r2.g1639885-1",
"description": "Detached debugging symbols for ddosify",
"dependencies": []
},
"de4dot": {
"version": "2090.b7d5728-1",
"description": ".NET deobfuscator and unpacker.",
"dependencies": [
"mono"
]
},
"deathstar": {
"version": "60.d7bcbfd-6",
"description": "Automate getting Domain Admin using Empire.",
"dependencies": [
"python",
"python-certifi",
"python-colorama",
"python-commonmark",
"python-h11",
"python-httpcore",
"python-httpx",
"python-idna",
"python-pygments",
"python-rfc3986",
"python-rich",
"python-sniffio",
"python-typing_extensions"
]
},
"debinject": {
"version": "43.d884309-3",
"description": "Inject malicious code into *.debs.",
"dependencies": [
"python2"
]
},
"deblaze": {
"version": "1:1.0608dc3-4",
"description": "Performs method enumeration and interrogation against flash remoting end points.",
"dependencies": [
"python2",
"python2-pillow6"
]
},
"decodify": {
"version": "50.76a0801-8",
"description": "Tool that can detect and decode encoded strings, recursively.",
"dependencies": [
"python",
"python-future"
]
},
"deen": {
"version": "601.fd9aebe-6",
"description": "Generic data encoding/decoding application built with PyQt5.",
"dependencies": [
"python",
"python-lxml",
"python-pyqt5",
"python-jsbeautifier",
"python-pyopenssl",
"python-jose",
"python-bcrypt",
"python-xmltodict",
"python-dicttoxml"
]
},
"deepce": {
"version": "121.a08648d-1",
"description": "Docker Enumeration, Escalation of Privileges and Container Escapes.",
"dependencies": [
"bash",
"lxc",
"podman",
"kubectl",
"docker",
"curl",
"wget",
"nmap",
"python",
"bind",
"jq"
]
},
"delldrac": {
"version": "0.1a-2",
"description": "DellDRAC and Dell Chassis Discovery and Brute Forcer.",
"dependencies": [
"python2"
]
},
"delorean": {
"version": "16.0291151-3",
"description": "NTP Main-in-the-Middle tool.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"demiguise": {
"version": "11.58d5681-5",
"description": "HTA encryption tool for RedTeams.",
"dependencies": [
"python"
]
},
"densityscout": {
"version": "45-1",
"description": "Calculates density for files of any file-system-path to finally output an accordingly descending ordered list.",
"dependencies": []
},
"depant": {
"version": "0.3a-12",
"description": "Check network for services with default passwords.",
"dependencies": [
"python2-ipcalc",
"hydra",
"nmap",
"python2-setuptools"
]
},
"depdep": {
"version": "2.0-2",
"description": "A merciless sentinel which will seek sensitive files containing critical info leaking through your network.",
"dependencies": [
"python2",
"smbclient",
"cifs-utils",
"java-environment",
"apache-tika"
]
},
"dependency-check": {
"version": "10.0.2-1",
"description": "A tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies.",
"dependencies": [
"bash",
"java-environment"
]
},
"depix": {
"version": "38.f7d1850-1",
"description": "A tool for recovering passwords from pixelized screenshots.",
"dependencies": [
"python",
"python-pillow"
]
},
"der-ascii": {
"version": "96.92a0052-1",
"description": "A reversible DER and BER pretty-printer.",
"dependencies": []
},
"der-ascii-debug": {
"version": "96.92a0052-1",
"description": "Detached debugging symbols for der-ascii",
"dependencies": []
},
"det": {
"version": "31.417cbce-6",
"description": "(extensible) Data Exfiltration Toolkit.",
"dependencies": [
"python2",
"python2-tweepy",
"python2-pysocks",
"python2-dnslib",
"python2-pycryptodome",
"python2-scapy"
]
},
"detectem": {
"version": "276.bc5f073-12",
"description": "Detect software and its version on websites.",
"dependencies": [
"python",
"python-requests",
"python-pytest",
"python-docker",
"python-click",
"python-yaml",
"python-zope-interface",
"python-dukpy",
"python-parsel",
"python-click-log",
"python-environs"
]
},
"detect-it-easy": {
"version": "3:3.10-1",
"description": "A program for determining types of files.",
"dependencies": [
"qt5-script"
]
},
"detect-it-easy-debug": {
"version": "3:3.10-1",
"description": "Detached debugging symbols for detect-it-easy",
"dependencies": []
},
"detect-secrets": {
"version": "v1.5.0.r49.g50119d6-1",
"description": "An enterprise friendly way of detecting and preventing secrets in code.",
"dependencies": [
"python",
"python-requests",
"python-yaml",
"python-ahocorasick",
"gibberish-detector"
]
},
"detect-sniffer": {
"version": "159.a359262-1",
"description": "Tool that detects sniffers in the network.",
"dependencies": [
"python2",
"python2-ldap",
"python2-scapy"
]
},
"devaudit": {
"version": "803.ca0a68e-1",
"description": "An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams.",
"dependencies": [
"mono",
"mono-tools",
"mono-msbuild"
]
},
"device-pharmer": {
"version": "40.b06a460-5",
"description": "Opens 1K+ IPs or Shodan search results and attempts to login.",
"dependencies": [
"python2",
"python2-mechanize",
"python2-beautifulsoup4",
"python2-gevent",
"python2-shodan",
"python2-setuptools"
]
},
"dex2jar": {
"version": "2.1-2",
"description": "A tool for converting Android's .dex format to Java's .class format",
"dependencies": [
"java-environment"
]
},
"dexpatcher": {
"version": "1.7.0-1",
"description": "Modify Android DEX/APK files at source-level using Java.",
"dependencies": [
"java-environment"
]
},
"dff-scanner": {
"version": "1.1-1",
"description": "Tool for finding path of predictable resource locations.",
"dependencies": []
},
"dfir-ntfs": {
"version": "1.1.19-3",
"description": "An NTFS parser for digital forensics & incident response.",
"dependencies": [
"python"
]
},
"dftimewolf": {
"version": "768.4f2b6d8a-1",
"description": "Framework for orchestrating forensic collection, processing and data export.",
"dependencies": [
"python",
"python-poetry"
]
},
"dga-detection": {
"version": "78.0a3186e-5",
"description": "DGA Domain Detection using Bigram Frequency Analysis.",
"dependencies": [
"python2",
"python2-argparse",
"python2-tldextract",
"python2-scapy",
"python2-alexa-top-sites",
"python2-pushbullet.py",
"python2-scipy",
"python2-websocket-client"
]
},
"dharma": {
"version": "98.6b1e511-6",
"description": "Generation-based, context-free grammar fuzzer.",
"dependencies": [
"python"
]
},
"dhcdrop": {
"version": "0.5-3",
"description": "Remove illegal dhcp servers with IP-pool underflow.",
"dependencies": []
},
"dhcpf": {
"version": "3.a770b20-2",
"description": "Passive DHCP fingerprinting implementation.",
"dependencies": [
"libpcap"
]
},
"dhcpig": {
"version": "2:110.f037788-3",
"description": "Enhanced DHCPv4 and DHCPv6 exhaustion and fuzzing script written in python using scapy network library.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"dhcpoptinj": {
"version": "123.58a12c6-1",
"description": "DHCP option injector.",
"dependencies": [
"libnetfilter_queue"
]
},
"didier-stevens-suite": {
"version": "407.409cd58-1",
"description": "Didier Stevens Suite.",
"dependencies": []
},
"didier-stevens-suite-debug": {
"version": "407.409cd58-1",
"description": "Detached debugging symbols for didier-stevens-suite",
"dependencies": []
},
"dietlibc": {
"version": "0.35-1",
"description": "A libc optimized for small size.",
"dependencies": []
},
"dietlibc-debug": {
"version": "0.35-1",
"description": "Detached debugging symbols for dietlibc",
"dependencies": []
},
"dinouml": {
"version": "0.9.5-2",
"description": "A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC",
"dependencies": []
},
"dirb": {
"version": "2.22-2",
"description": "A web content scanner, brute forceing for hidden files.",
"dependencies": []
},
"dirble": {
"version": "1:1.4.2-1",
"description": "Fast directory scanning and scraping tool.",
"dependencies": [
"curl"
]
},
"dirbuster": {
"version": "1.0_RC1-11",
"description": "An application designed to brute force directories and files names on web/application servers",
"dependencies": [
"java-environment"
]
},
"dirbuster-ng": {
"version": "9.0c34920-1",
"description": "C CLI implementation of the Java dirbuster tool.",
"dependencies": []
},
"directorytraversalscan": {
"version": "1.0.1.0-3",
"description": "Detect directory traversal vulnerabilities in HTTP servers and web applications.",
"dependencies": []
},
"dirhunt": {
"version": "329.a5ea20d-4",
"description": "Find web directories without bruteforce.",
"dependencies": [
"python",
"python-click",
"python-requests",
"python-requests-mock",
"python-humanize",
"python-colorama",
"python-beautifulsoup4",
"python-proxy-db",
"python-google"
]
},
"dirscanner": {
"version": "0.1-6",
"description": "This is a python script that scans webservers looking for administrative directories, php shells, and more.",
"dependencies": [
"python2"
]
},
"dirscraper": {
"version": "16.e752450-9",
"description": "OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-beautifulsoup4",
"python-html5lib"
]
},
"dirsearch": {
"version": "2496.46f57e5-1",
"description": "HTTP(S) directory/file brute forcer.",
"dependencies": [
"python",
"python-pysocks",
"python-jinja",
"python-certifi",
"python-urllib3",
"python-cryptography",
"python-cffi",
"python-psycopg",
"python-defusedxml",
"python-markupsafe",
"python-pyopenssl",
"python-idna",
"python-chardet",
"python-charset-normalizer",
"python-requests",
"python-requests-ntlm",
"python-colorama",
"python-ntlm-auth",
"python-pyparsing",
"python-beautifulsoup4",
"python-mysql-connector"
]
},
"dirstalk": {
"version": "1.3.3-3",
"description": "Modern alternative to dirbuster/dirb.",
"dependencies": []
},
"disitool": {
"version": "0.4-8",
"description": "Tool to work with Windows executables digital signatures.",
"dependencies": [
"python",
"python-pefile"
]
},
"dislocker": {
"version": "1:v0.7.3.r42.g3e7aea1-3",
"description": "Read BitLocker encrypted volumes under Linux.",
"dependencies": [
"fuse",
"mbedtls",
"ruby"
]
},
"dislocker-debug": {
"version": "1:v0.7.3.r42.g3e7aea1-3",
"description": "Detached debugging symbols for dislocker",
"dependencies": []
},
"dissector": {
"version": "1-3",
"description": "This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.",
"dependencies": []
},
"dizzy": {
"version": "2.0-11",
"description": "A Python based fuzzing framework with many features.",
"dependencies": [
"python",
"python-pcapy",
"exrex"
]
},
"dkmc": {
"version": "56.3c238f0-3",
"description": "Dont kill my cat - Malicious payload evasion tool.",
"dependencies": [
"python2"
]
},
"dmde": {
"version": "4.2.2.816-1",
"description": "Disk Editor and Data Recovery Software.",
"dependencies": [
"gtk2"
]
},
"dmde-debug": {
"version": "4.2.2.816-1",
"description": "Detached debugging symbols for dmde",
"dependencies": []
},
"dmg2img": {
"version": "1.6.7-7",
"description": "A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format.",
"dependencies": [
"openssl",
"bzip2"
]
},
"dmg2img-debug": {
"version": "1.6.7-7",
"description": "Detached debugging symbols for dmg2img",
"dependencies": []
},
"dmitry": {
"version": "1.3a-6",
"description": "Deepmagic Information Gathering Tool.",
"dependencies": []
},
"dmitry-debug": {
"version": "1.3a-6",
"description": "Detached debugging symbols for dmitry",
"dependencies": []
},
"dnmap": {
"version": "0.6-9",
"description": "The distributed nmap framework.",
"dependencies": [
"python2-twistedx",
"python2-pyopenssl",
"python2"
]
},
"dns2geoip": {
"version": "0.1-5",
"description": "A simple python script that brute forces DNS and subsequently geolocates the found subdomains.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-geoip",
"python2-simplekml"
]
},
"dns2tcp": {
"version": "0.5.2-6",
"description": "A tool for relaying TCP connections over DNS.",
"dependencies": []
},
"dnsa": {
"version": "0.6-1",
"description": "A dns security swiss army knife.",
"dependencies": [
"libnet",
"libpcap"
]
},
"dnsbf": {
"version": "0.3-1",
"description": "Search for available domain names in an IP range.",
"dependencies": []
},
"dnsbrute": {
"version": "2.b1dc84a-5",
"description": "Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.",
"dependencies": [
"python2",
"python2-dnspython"
]
},
"dnscan": {
"version": "209.281721e-2",
"description": "A python wordlist-based DNS subdomain scanner.",
"dependencies": [
"python",
"python-dnspython",
"python-netaddr",
"python-cryptography"
]
},
"dnschef": {
"version": "17.a395411-8",
"description": "A highly configurable DNS proxy for pentesters.",
"dependencies": [
"python",
"python-dnslib"
]
},
"dnscobra": {
"version": "1.0-5",
"description": "DNS subdomain bruteforcing tool with Tor support through torsocks.",
"dependencies": [
"python"
]
},
"dnsdiag": {
"version": "343.39a1b1e-4",
"description": "DNS Diagnostics and Performance Measurement Tools.",
"dependencies": [
"python",
"python-dnspython",
"python-cymruwhois"
]
},
"dnsdrdos": {
"version": "0.1-4",
"description": "Proof of concept code for distributed DNS reflection DoS.",
"dependencies": []
},
"dnsenum": {
"version": "1.2.4.2-6",
"description": "Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.",
"dependencies": [
"perl",
"perl-net-dns",
"perl-net-ip",
"perl-net-netmask",
"perl-www-mechanize",
"perl-net-whois-ip",
"perl-xml-writer",
"perl-string-random"
]
},
"dnsfilexfer": {
"version": "24.126edcd-4",
"description": "File transfer via DNS.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-pycryptodome"
]
},
"dnsgen": {
"version": "v1.0.4.r12.g7c98e7e-2",
"description": "Generate combination of domain names from the provided input.",
"dependencies": [
"python",
"python-click",
"python-rich",
"python-tldextract"
]
},
"dnsgoblin": {
"version": "1:0.1-2",
"description": "Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.",
"dependencies": []
},
"dnsgrep": {
"version": "14.3f4fa7c-3",
"description": "A utility for quickly searching presorted DNS names.",
"dependencies": [
"glibc",
"go"
]
},
"dnsmap": {
"version": "19.6d34014-2",
"description": "Passive DNS network mapper.",
"dependencies": [
"python"
]
},
"dnsobserver": {
"version": "5.f331482-2",
"description": "A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities.",
"dependencies": [
"glibc"
]
},
"dns-parallel-prober": {
"version": "68.422db61-3",
"description": "PoC for an adaptive parallelised DNS prober.",
"dependencies": [
"python2",
"python2-argparse",
"python2-progressbar",
"python2-dnspython"
]
},
"dnspredict": {
"version": "0.0.2-5",
"description": "DNS prediction.",
"dependencies": [
"perl",
"perl-libwww"
]
},
"dnsprobe": {
"version": "56.7120008-2",
"description": "Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.",
"dependencies": [
"glibc"
]
},
"dnspy": {
"version": "6.1.8-2",
"description": ".NET debugger and assembly editor.",
"dependencies": []
},
"dnsrecon": {
"version": "2:1.3.1-5",
"description": "Python script for enumeration of hosts, subdomains and emails from a given domain using google.",
"dependencies": [
"python",
"python-netaddr",
"python-dnspython",
"python-lxml"
]
},
"dns-reverse-proxy": {
"version": "40.6bc04de-1",
"description": "A reverse DNS proxy written in Go.",
"dependencies": []
},
"dns-reverse-proxy-debug": {
"version": "40.6bc04de-1",
"description": "Detached debugging symbols for dns-reverse-proxy",
"dependencies": []
},
"dnssearch": {
"version": "20.e4ea439-4",
"description": "A subdomain enumeration tool.",
"dependencies": []
},
"dnsspider": {
"version": "1.4-5",
"description": "A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.",
"dependencies": [
"python",
"python-dnspython"
]
},
"dns-spoof": {
"version": "13.81ba29f-1",
"description": "Yet another DNS spoof utility.",
"dependencies": [
"libpcap"
]
},
"dnsteal": {
"version": "28.1b09d21-3",
"description": "DNS Exfiltration tool for stealthily sending files over DNS requests..",
"dependencies": [
"python2"
]
},
"dnstracer": {
"version": "1.10-3",
"description": "Determines where a given DNS server gets its information from, and follows the chain of DNS servers",
"dependencies": [
"glibc"
]
},
"dnstracer-debug": {
"version": "1.10-3",
"description": "Detached debugging symbols for dnstracer",
"dependencies": []
},
"dnstwist": {
"version": "643.4e6e477-1",
"description": "Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.",
"dependencies": [
"python",
"python-geoip",
"python-dnspython",
"python-requests",
"python-ppdeep",
"python-python-whois",
"python-tld"
]
},
"dnsvalidator": {
"version": "82.146c9b0-6",
"description": "Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.",
"dependencies": [
"python",
"python-requests",
"python-dnspython",
"python-colorclass",
"python-netaddr"
]
},
"dnswalk": {
"version": "2.0.2-11",
"description": "A DNS debugger and zone-transfer utility.",
"dependencies": [
"perl-net-dns"
]
},
"dnswatch": {
"version": "dnswatch.1.r18.g7ee12c9-1",
"description": "DNS Traffic Sniffer and Analyzer.",
"dependencies": [
"python",
"python-argparse",
"python-pyfiglet",
"python-requests",
"python-scapy"
]
},
"dnsx": {
"version": "1128.d400307-1",
"description": "Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.",
"dependencies": []
},
"dnsx-debug": {
"version": "1128.d400307-1",
"description": "Detached debugging symbols for dnsx",
"dependencies": []
},
"docem": {
"version": "21.59db436-5",
"description": "Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids).",
"dependencies": [
"python",
"python-lxml"
]
},
"dockerscan": {
"version": "59.590a844-12",
"description": "Docker security analysis & hacking tools.",
"dependencies": [
"python",
"python-requests",
"python-pytest",
"python-click",
"python-python-dxf",
"python-colorlog",
"python-booby-ng",
"python-cryptography"
]
},
"dockerscan-debug": {
"version": "59.590a844-12",
"description": "Detached debugging symbols for dockerscan",
"dependencies": []
},
"domain-analyzer": {
"version": "0.8.1-4",
"description": "Finds all the security information for a given domain name.",
"dependencies": [
"python2",
"python2-httplib2",
"python2-dnspython"
]
},
"domained": {
"version": "80.d9d079c-7",
"description": "Multi Tool Subdomain Enumeration.",
"dependencies": [
"python",
"python-colorama",
"python-requests",
"ldns",
"go",
"sublist3r",
"knock",
"subbrute",
"massdns",
"recon-ng",
"amass",
"subfinder"
]
},
"domainhunter": {
"version": "51.38cb7ef-6",
"description": "Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-lxml",
"python-pillow",
"python-pytesseract",
"python-urllib3",
"python-texttable"
]
},
"domain-stats": {
"version": "169.759c52c-5",
"description": "A web API to deliver domain information from whois and alexa.",
"dependencies": [
"python",
"python-requests",
"python-yaml",
"python-rdap",
"python-munge",
"python-dateutil",
"python-publicsuffixlist"
]
},
"domato": {
"version": "133.fadff39-3",
"description": "DOM fuzzer.",
"dependencies": [
"python"
]
},
"domi-owned": {
"version": "41.583d0a5-11",
"description": "A tool used for compromising IBM/Lotus Domino servers.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests",
"python-tqdm",
"python-fake-useragent",
"python-simple-requests",
"python-tabulate",
"python-aiohttp",
"python-inflect"
]
},
"domlink": {
"version": "37.1cabd5d-2",
"description": "A tool to link a domain with registered organisation names and emails, to other domains.",
"dependencies": [
"python2",
"python2-argparse",
"python2-requests"
]
},
"donpapi": {
"version": "1:V1.2.0.r37.gfd8eb66-4",
"description": "Dumping revelant information on compromised targets without AV detection with DPAPI.",
"dependencies": [
"python",
"impacket",
"python-pyasn",
"python-lnkparse3",
"python-wheel",
"python-m2crypto",
"python-pycryptodome",
"swig"
]
},
"dontgo403": {
"version": "1:1.0.1.r20.g34770db-1",
"description": "Tool to bypass 40X response codes..",
"dependencies": [
"glibc"
]
},
"dontgo403-debug": {
"version": "1:1.0.1.r20.g34770db-1",
"description": "Detached debugging symbols for dontgo403",
"dependencies": []
},
"donut": {
"version": "529.47758d7-3",
"description": "Generates x86, x64 or AMD64+x86 P.I. shellcode loading .NET Assemblies from memory.",
"dependencies": [
"python"
]
},
"donut-debug": {
"version": "529.47758d7-3",
"description": "Detached debugging symbols for donut",
"dependencies": []
},
"doona": {
"version": "145.7a4796c-3",
"description": "A fork of the Bruteforce Exploit Detector Tool (BED).",
"dependencies": [
"perl"
]
},
"doork": {
"version": "6.90c7260-5",
"description": "Passive Vulnerability Auditor.",
"dependencies": [
"python2",
"python2-requests",
"python2-beautifulsoup4",
"python2-xgoogle",
"python2-simplejson",
"python2-django"
]
},
"doozer": {
"version": "9.5cfc8f8-5",
"description": "A Password cracking utility.",
"dependencies": [
"python2",
"python2-requests",
"python2-django",
"ophcrack",
"hashcat"
]
},
"dorkbot": {
"version": "223.798b7fa-3",
"description": "Command-line tool to scan Google search results for vulnerabilities.",
"dependencies": [
"python"
]
},
"dorkme": {
"version": "57.0a7017a-3",
"description": "Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.",
"dependencies": [
"python",
"python-google-search-api"
]
},
"dorknet": {
"version": "58.419d6a2-4",
"description": "Selenium powered Python script to automate searching for vulnerable web apps.",
"dependencies": [
"python2",
"python2-argparse",
"python2-blessings",
"python2-selenium",
"python2-six"
]
},
"dorkscout": {
"version": "1.0.r13.gdd87daf-1",
"description": "Golang tool to automate google dork scan against the entire internet or specific targets.",
"dependencies": [
"glibc"
]
},
"dotdotpwn": {
"version": "3.0.2-5",
"description": "The Transversal Directory Fuzzer.",
"dependencies": [
"perl",
"perl-http-lite",
"perl-tftp",
"perl-switch",
"perl-io-socket",
"perl-io-socket-ssl",
"perl-libwww"
]
},
"dotpeek": {
"version": "2021.3.3-1",
"description": "Free .NET Decompiler and Assembly Browser.",
"dependencies": []
},
"dpeparser": {
"version": "1:beta002-3",
"description": "Default password enumeration project",
"dependencies": [
"python2"
]
},
"dpkt-svn": {
"version": "82-1",
"description": "Fast, simple packet creation / parsing module for python, with definitions for the basic TCP/IP protocols.",
"dependencies": []
},
"dpscan": {
"version": "0.1-5",
"description": "Drupal Vulnerability Scanner.",
"dependencies": [
"python2"
]
},
"dr0p1t-framework": {
"version": "44.db9bc2d-4",
"description": "A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks.",
"dependencies": [
"python2",
"pyinstaller"
]
},
"dracnmap": {
"version": "69.09d3945-1",
"description": "Tool to exploit the network and gathering information with nmap help.",
"dependencies": [
"nmap",
"firefox",
"nano",
"xterm"
]
},
"dradis-ce": {
"version": "5575.ed72071c-1",
"description": "An open source framework to enable effective information sharing.",
"dependencies": [
"ruby",
"ruby-bundler",
"git",
"libxslt",
"mariadb-libs"
]
},
"dragon-backdoor": {
"version": "7.c7416b7-4",
"description": "A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c.",
"dependencies": []
},
"dr-checker": {
"version": "140.ea63c0f-3",
"description": "A Soundy Vulnerability Detection Tool for Linux Kernel Drivers.",
"dependencies": [
"python2"
]
},
"driftnet": {
"version": "1:v1.3.0.r13.ge492335-2",
"description": "Listens to network traffic and picks out images from TCP streams it observes.",
"dependencies": [
"libjpeg",
"libpcap",
"gtk2",
"giflib",
"libwebsockets"
]
},
"drinkme": {
"version": "19.acf1a14-1",
"description": "A shellcode testing harness.",
"dependencies": []
},
"dripcap": {
"version": "0.6.15-1",
"description": "Caffeinated Packet Analyzer.",
"dependencies": []
},
"dripper": {
"version": "v1.r1.gc9bb0c9-1",
"description": "A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.",
"dependencies": []
},
"droopescan": {
"version": "1.45.1-7",
"description": "A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.",
"dependencies": [
"python",
"python-cement",
"python-requests",
"python-pystache",
"python-mock",
"python-lxml",
"python-nose",
"python-beautifulsoup4",
"python-simplejson",
"python-twisted",
"python-dateutil"
]
},
"drozer": {
"version": "2.4.4-11",
"description": "A security testing framework for Android - Precompiled binary from official repository.",
"dependencies": [
"jre8-openjdk",
"python2",
"protobuf",
"python2-protobuf",
"python2-pyopenssl",
"python2-twistedx",
"python2-service-identity"
]
},
"drupal-module-enum": {
"version": "11.525543c-5",
"description": "Enumerate on drupal modules.",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"drupalscan": {
"version": "0.5.2-14",
"description": "Simple non-intrusive Drupal scanner.",
"dependencies": [
"ruby"
]
},
"drupwn": {
"version": "1:59.8186732-8",
"description": "Drupal enumeration & exploitation tool.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"python-prompt_toolkit",
"python-veryprettytable",
"python-pysocks"
]
},
"dsd": {
"version": "91.7ee04e5-1",
"description": "Digital Speech Decoder",
"dependencies": []
},
"dsd-fme": {
"version": "2024-1",
"description": "Digital Speech Decoder - Florida Man Edition.",
"dependencies": [
"libpulse",
"ncurses",
"rtl-sdr",
"fftw",
"codec2",
"libsndfile",
"itpp",
"xz",
"mbelib",
"glibc",
"gcc-libs",
"libogg",
"libvorbis",
"flac",
"lapack",
"opus",
"mpg123",
"lame",
"blas",
"libusb",
"dbus",
"libxcb",
"systemd-libs",
"zstd",
"libasyncns",
"libxau",
"libxdmcp",
"libcap",
"lz4",
"libgpg-error"
]
},
"dsd-fme-debug": {
"version": "2024-1",
"description": "Detached debugging symbols for dsd-fme",
"dependencies": []
},
"dsfs": {
"version": "36.8e9f8e9-6",
"description": "A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.",
"dependencies": [
"python"
]
},
"dshell": {
"version": "142.695c891-3",
"description": "A network forensic analysis framework.",
"dependencies": [
"elasticsearch",
"geoip",
"python2",
"python2-dpkt",
"python2-elasticsearch",
"python2-geoip",
"python2-ipy",
"python2-pypcap"
]
},
"dsjs": {
"version": "32.26287d0-7",
"description": "A fully functional JavaScript library vulnerability scanner written in under 100 lines of code.",
"dependencies": [
"python",
"python-simplejson"
]
},
"dsss": {
"version": "124.f354215-1",
"description": "A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.",
"dependencies": [
"python"
]
},
"dsstore-crawler": {
"version": "7.efa51f5-5",
"description": "A parser + crawler for .DS_Store files exposed publically.",
"dependencies": [
"python",
"python-argparse",
"python-ds-store",
"python-mac-alias",
"python-urllib3",
"python-requests"
]
},
"dsxs": {
"version": "130.3e628b6-5",
"description": "A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.",
"dependencies": [
"python"
]
},
"d-tect": {
"version": "13.9555c25-1",
"description": "Pentesting the Modern Web.",
"dependencies": [
"python2"
]
},
"dtp-spoof": {
"version": "5.3ae05fc-3",
"description": "Python script/security tool to test Dynamic Trunking Protocol configuration on a switch.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"dublin-traceroute": {
"version": "347.d81c77e-2",
"description": "NAT-aware multipath tracerouting tool.",
"dependencies": [
"jsoncpp",
"libtins",
"libpcap",
"gtest"
]
},
"dublin-traceroute-debug": {
"version": "347.d81c77e-2",
"description": "Detached debugging symbols for dublin-traceroute",
"dependencies": []
},
"ducktoolkit": {
"version": "37.42da733-6",
"description": "Encoding Tools for Rubber Ducky.",
"dependencies": [
"python"
]
},
"dumb0": {
"version": "19.1493e74-2",
"description": "A simple tool to dump users in popular forums and CMS.",
"dependencies": [
"perl",
"perl-libwww"
]
},
"dump1090": {
"version": "386.bff92c4-3",
"description": "A simple Mode S decoder for RTLSDR devices.",
"dependencies": [
"rtl-sdr"
]
},
"dumpacl": {
"version": "1:0.1-1",
"description": "Dumps NTs ACLs and audit settings.",
"dependencies": []
},
"dumpsmbshare": {
"version": "23.1e5ceb1-1",
"description": "A script to dump files and folders remotely from a Windows SMB share.",
"dependencies": [
"python",
"impacket"
]
},
"dumpusers": {
"version": "1.0-2",
"description": "Dumps account names and information even though RestrictAnonymous has been set to 1.",
"dependencies": []
},
"dumpzilla": {
"version": "03152013-10",
"description": "A forensic tool for firefox.",
"dependencies": [
"python",
"python-simplejson",
"python-pysqlite3",
"nss"
]
},
"duplicut": {
"version": "2.2-1",
"description": "Remove duplicates from massive wordlist, without sorting it (for dictionnary-based password cracking).",
"dependencies": []
},
"dutas": {
"version": "10.37fa3ab-6",
"description": "Analysis PE file or Shellcode.",
"dependencies": [
"python2",
"python2-capstone",
"capstone",
"unicorn",
"python2-unicorn",
"python2-pefile",
"python2-setuptools"
]
},
"dvcs-ripper": {
"version": "54.2c1bbc6-4",
"description": "Rip web accessible (distributed) version control systems: SVN/GIT/BZR/CVS/HG.",
"dependencies": [
"perl",
"perl-lwp-protocol-https",
"perl-io-socket-ssl",
"perl-getopt-long"
]
},
"dwarf": {
"version": "1084.fd859ae-4",
"description": "Full featured multi arch/os debugger built on top of PyQt5 and frida.",
"dependencies": [
"python-capstone",
"python-event-bus",
"python-frida",
"python-hexdump",
"python-pyperclip",
"python-pyqt5",
"python-qdarkstyle",
"python-requests",
"python-unicorn"
]
},
"dynamorio": {
"version": "9.0.19046-1",
"description": "A dynamic binary instrumentation framework.",
"dependencies": []
},
"eapeak": {
"version": "130.9550d1c-3",
"description": "Analysis Suite For EAP Enabled Wireless Networks.",
"dependencies": [
"python2",
"python2-scapy",
"python2-m2crypto"
]
},
"eaphammer": {
"version": "1:v1.14.1.r0.g91e8956-4",
"description": "Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.",
"dependencies": [
"python",
"python-tqdm",
"dnsmasq",
"libnfnetlink",
"libnl",
"openssl",
"python-pem",
"python-pyopenssl",
"apache",
"libpcap",
"curl",
"scapy",
"responder",
"hcxtools",
"hcxdumptool",
"python-beautifulsoup4",
"python-flask",
"python-flask-cors",
"python-flask-socketio",
"python-gevent",
"python-lxml",
"python-requests",
"python-pywebcopy"
]
},
"eaphammer-debug": {
"version": "1:v1.14.1.r0.g91e8956-4",
"description": "Detached debugging symbols for eaphammer",
"dependencies": []
},
"eapmd5pass": {
"version": "3.3d5551f-2",
"description": "An implementation of an offline dictionary attack against the EAP-MD5 protocol.",
"dependencies": [
"libpcap"
]
},
"eapmd5pass-debug": {
"version": "3.3d5551f-2",
"description": "Detached debugging symbols for eapmd5pass",
"dependencies": []
},
"easy-creds": {
"version": "45.bf9f00c-1",
"description": "A bash script that leverages ettercap and other tools to obtain credentials.",
"dependencies": [
"bash",
"ettercap",
"dsniff",
"dhcp",
"hostapd",
"ipcalc",
"screen",
"freeradius",
"hamster",
"sslstrip",
"metasploit",
"mdk3",
"aircrack-ng",
"asleap"
]
},
"easyda": {
"version": "7.0867f9b-3",
"description": "Easy Windows Domain Access Script.",
"dependencies": [
"bash",
"metasploit"
]
},
"easyfuzzer": {
"version": "3.6-7",
"description": "A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent).",
"dependencies": [
"perl",
"perl-io-socket-ip"
]
},
"eazy": {
"version": "0.1-5",
"description": "This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.",
"dependencies": [
"python2"
]
},
"ecfs": {
"version": "305.1758063-1",
"description": "Extended core file snapshot format.",
"dependencies": [
"libdwarf",
"glibc"
]
},
"edb": {
"version": "3337.eedd97a0-1",
"description": "A cross platform AArch32/x86/x86-64 debugger.",
"dependencies": [
"qt5-xmlpatterns",
"capstone",
"graphviz",
"qt5-svg",
"gtk-update-icon-cache"
]
},
"edb-debug": {
"version": "3337.eedd97a0-1",
"description": "Detached debugging symbols for edb",
"dependencies": []
},
"eggshell": {
"version": "157.eaeeea7-3",
"description": "iOS/macOS/Linux Remote Administration Tool.",
"dependencies": [
"python2"
]
},
"eigrp-tools": {
"version": "0.1-1",
"description": "This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol.",
"dependencies": [
"perl",
"perl-net-rawip",
"perl-netpacket"
]
},
"eindeutig": {
"version": "20050628_1-4",
"description": "Examine the contents of Outlook Express DBX email repository files (forensic purposes)",
"dependencies": []
},
"elasticsearch": {
"version": "7.10.2-3",
"description": "Distributed RESTful search engine built on top of Lucene.",
"dependencies": [
"java-runtime-headless<=16",
"systemd",
"libxml2"
]
},
"electric-fence": {
"version": "2.2.5-1",
"description": "A malloc(3) debugger that uses virtual memory hardware to detect illegal memory accesses.",
"dependencies": [
"glibc",
"bash"
]
},
"elettra": {
"version": "1.0-4",
"description": "Encryption utility by Julia Identity",
"dependencies": []
},
"elettra-gui": {
"version": "1.0-5",
"description": "Gui for the elettra crypto application.",
"dependencies": [
"wxgtk3",
"elettra"
]
},
"elevate": {
"version": "27.1272d51-7",
"description": "Horizontal domain discovery tool you can use to discover other domains owned by a given company.",
"dependencies": [
"python",
"python-requests"
]
},
"elfparser": {
"version": "7.39d21ca-2",
"description": "Cross Platform ELF analysis.",
"dependencies": [
"boost"
]
},
"elidecode": {
"version": "48.38fa5ba-6",
"description": "A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code.",
"dependencies": [
"python2",
"python2-unicorn",
"python2-argparse",
"python2-capstone",
"python2-setuptools",
"capstone",
"unicorn",
"bash"
]
},
"elite-proxy-finder": {
"version": "51.1ced3be-5",
"description": "Finds public elite anonymity proxies and concurrently tests them.",
"dependencies": [
"python2",
"python2-gevent",
"python2-requests",
"python2-beautifulsoup3",
"python2-setuptools"
]
},
"email2phonenumber": {
"version": "29.9df9dbe-3",
"description": "A OSINT tool to obtain a target's phone number just by having his email address.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-requests"
]
},
"emldump": {
"version": "0.0.11-3",
"description": "Analyze MIME files.",
"dependencies": [
"python2"
]
},
"emp3r0r-debug": {
"version": "v2.4.3.r5.gddd50bf5-1",
"description": "Detached debugging symbols for emp3r0r",
"dependencies": []
},
"emp3r0r": {
"version": "v2.4.3.r5.gddd50bf5-1",
"description": "Linux post-exploitation framework made by linux user.",
"dependencies": [
"tmux",
"bash"
]
},
"empire": {
"version": "3:v5.12.2.r0.g2765c6a-1",
"description": "A PowerShell and Python post-exploitation agent.",
"dependencies": [
"python",
"mariadb",
"openssl"
]
},
"empire-debug": {
"version": "3:v5.12.2.r0.g2765c6a-1",
"description": "Detached debugging symbols for empire",
"dependencies": []
},
"enabler": {
"version": "1-7",
"description": "Attempts to find the enable password on a cisco system via brute force.",
"dependencies": [
"glibc"
]
},
"encodeshellcode": {
"version": "0.1b-3",
"description": "This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.",
"dependencies": []
},
"ent": {
"version": "1.0-2",
"description": "Pseudorandom number sequence test.",
"dependencies": []
},
"enteletaor": {
"version": "68.a975b5c-7",
"description": "Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ.",
"dependencies": [
"python",
"python-six",
"python-lxml",
"python-wtforms",
"python-eventlet",
"python-colorlog",
"python-requests",
"python-netaddr",
"python-amqp",
"python-redis",
"python-kombu",
"python-celery",
"python-pyzmq",
"python-future",
"python-markupsafe"
]
},
"entropy": {
"version": "702.13aac50-1",
"description": "A set of tools to exploit Netwave and GoAhead IP Webcams.",
"dependencies": [
"python",
"python-requests",
"python-tailer",
"python-shodan"
]
},
"enum4linux": {
"version": "0.9.1-3",
"description": "A tool for enumerating information from Windows and Samba systems.",
"dependencies": [
"perl",
"polenum",
"smbclient",
"openldap"
]
},
"enum4linux-ng": {
"version": "422.70c6ea1-4",
"description": "A next generation version of enum4linux.",
"dependencies": [
"python",
"smbclient",
"python-ldap3",
"python-yaml",
"impacket"
]
},
"enumerate-iam": {
"version": "14.4529114-7",
"description": "Enumerate the permissions associated with an AWS credential set.",
"dependencies": [
"python",
"python-boto3",
"python-botocore"
]
},
"enumerid": {
"version": "36.d3e7265-3",
"description": "Enumerate RIDs using pure Python.",
"dependencies": [
"python2",
"python2-argparse",
"python2-impacket",
"python2-dnspython"
]
},
"enumiax": {
"version": "1.0-6",
"description": "An IAX enumerator.",
"dependencies": []
},
"enum-shares": {
"version": "7.97cba5a-6",
"description": "Tool that enumerates shared folders across the network and under a custom user account.",
"dependencies": [
"python2",
"python2-pysmb",
"python2-ipcalc",
"python2-argparse",
"python2-six"
]
},
"enyelkm": {
"version": "1.2-2",
"description": "Rootkit for Linux x86 kernels v2.6.",
"dependencies": []
},
"eos": {
"version": "16.47f0086-4",
"description": "Enemies Of Symfony - Debug mode Symfony looter.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-defusedxml"
]
},
"epicwebhoneypot": {
"version": "2.0a-3",
"description": "Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.",
"dependencies": []
},
"eraser": {
"version": "6.2.0.2992-1",
"description": "Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.",
"dependencies": []
},
"erase-registrations": {
"version": "1.0-3",
"description": "An IAX flooder.",
"dependencies": [
"libnet"
]
},
"eresi": {
"version": "1291.4769c175-3",
"description": "The ERESI Reverse Engineering Software Interface.",
"dependencies": [
"openssl"
]
},
"eresi-debug": {
"version": "1291.4769c175-3",
"description": "Detached debugging symbols for eresi",
"dependencies": []
},
"erl-matter": {
"version": "53.ab793cd-3",
"description": "Tool to exploit epmd related services such as rabbitmq, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards.",
"dependencies": [
"glibc",
"python"
]
},
"erl-matter-debug": {
"version": "53.ab793cd-3",
"description": "Detached debugging symbols for erl-matter",
"dependencies": []
},
"espionage": {
"version": "1:48.2d57edd-4",
"description": "A Network Packet and Traffic Interceptor For Linux. Sniff All Data Sent Through a Network.",
"dependencies": [
"python",
"python-httpcap",
"python-netifaces",
"python-termcolor",
"python-scapy",
"python-requests"
]
},
"eternal-scanner": {
"version": "101.3979b0f-1",
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue).",
"dependencies": [
"bash",
"masscan",
"metasploit"
]
},
"etherchange": {
"version": "1.1-2",
"description": "Can change the Ethernet address of the network adapters in Windows.",
"dependencies": []
},
"etherflood": {
"version": "1.1-2",
"description": "Floods a switched network with Ethernet frames with random hardware addresses.",
"dependencies": []
},
"evilclippy": {
"version": "62.fa610c6-1",
"description": "A cross-platform assistant for creating malicious MS Office documents.",
"dependencies": [
"mono"
]
},
"evilgrade": {
"version": "2.0.9-4",
"description": "Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.",
"dependencies": [
"perl",
"perl-data-dump",
"perl-io-socket-ssl",
"perl-digest-sha1",
"perl-rpc-xml"
]
},
"evilize": {
"version": "0.2-2",
"description": "Tool to create MD5 colliding binaries.",
"dependencies": []
},
"evilize-debug": {
"version": "0.2-2",
"description": "Detached debugging symbols for evilize",
"dependencies": []
},
"evillimiter": {
"version": "36.46d2033-9",
"description": "Tool that limits bandwidth of devices on the same network without access.",
"dependencies": [
"python",
"python-netaddr",
"python-netifaces",
"python-colorama",
"python-terminaltables",
"python-tqdm",
"scapy"
]
},
"evilmaid": {
"version": "1.01-2",
"description": "TrueCrypt loader backdoor to sniff volume password",
"dependencies": []
},
"evilpdf": {
"version": "5.43696a8-1",
"description": "Embedding executable files in PDF Documents.",
"dependencies": [
"python",
"python-pypdf2"
]
},
"evil-ssdp": {
"version": "96.0d41a11-5",
"description": "Spoof SSDP replies to phish for NetNTLM challenge/response on a network.",
"dependencies": [
"python",
"python-argparse"
]
},
"evil-winrm": {
"version": "1:v3.7.r0.gffe958c-2",
"description": "The ultimate WinRM shell for hacking/pentesting.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt",
"ruby-rexml",
"git",
"openssl"
]
},
"evine": {
"version": "42.46051de-1",
"description": "Interactive CLI Web Crawler.",
"dependencies": []
},
"evtkit": {
"version": "8.af06db3-4",
"description": "Fix acquired .evt - Windows Event Log files (Forensics).",
"dependencies": [
"python2"
]
},
"exabgp": {
"version": "1:4.2.6.r760.g0834593-1",
"description": "The BGP swiss army knife of networking.",
"dependencies": [
"python",
"python-ipaddr",
"python-nose",
"python-psutil"
]
},
"exe2hex": {
"version": "1.5.1.r6.ge563b35-4",
"description": "Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).",
"dependencies": [
"python"
]
},
"exe2image": {
"version": "1.1-1",
"description": "A simple utility to convert EXE files to JPEG images and vice versa.",
"dependencies": [
"java-environment"
]
},
"exescan": {
"version": "1.ad993e3-5",
"description": "A tool to detect anomalies in PE (Portable Executable) files.",
"dependencies": [
"python2",
"python2-pefile"
]
},
"exiflooter": {
"version": "39.0c9535f-2",
"description": "Find geolocation on all image urls and directories also integrates with OpenStreetMap.",
"dependencies": [
"perl-image-exiftool"
]
},
"exiflooter-debug": {
"version": "39.0c9535f-2",
"description": "Detached debugging symbols for exiflooter",
"dependencies": []
},
"exitmap": {
"version": "373.8155029-3",
"description": "A fast and modular scanner for Tor exit relays.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-stem",
"python2-configparser",
"python2-pysocks",
"tor"
]
},
"exiv2": {
"version": "0.28.3-1",
"description": "Exif, Iptc and XMP metadata manipulation library and tools",
"dependencies": [
"brotli",
"libbrotlidec.so=1-64",
"curl",
"expat",
"libexpat.so=1-64",
"gcc-libs",
"gettext",
"glibc",
"libcurl.so=4-64",
"libinih",
"libINIReader.so=0-64",
"zlib",
"libz.so=1-64"
]
},
"expimp-lookup": {
"version": "4.79a96c7-2",
"description": "Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.",
"dependencies": [
"python2"
]
},
"exploit-db": {
"version": "1.6-8",
"description": "The Exploit Database (EDB) \u2013 an ultimate archive of exploits and vulnerable software - A collection of hacks",
"dependencies": [
"curl"
]
},
"exploitpack": {
"version": "139.e565c47-1",
"description": "Exploit Pack - The next generation exploit framework.",
"dependencies": [
"java-environment"
]
},
"expose": {
"version": "1110.30264af-1",
"description": "A Dynamic Symbolic Execution (DSE) engine for JavaScript",
"dependencies": [
"nodejs",
"clang",
"gnuplot",
"python2",
"mitmproxy",
"npm",
"libxtst"
]
},
"express": {
"version": "1:4.17.3-1",
"description": "High performance, high class web development for node.js.",
"dependencies": [
"nodejs"
]
},
"exrex": {
"version": "149.b91c075-2",
"description": "Irregular methods on regular expressions.",
"dependencies": [
"python"
]
},
"extended-ssrf-search": {
"version": "28.680f815-2",
"description": "Smart ssrf scanner using different methods like parameter brute forcing in post and get.",
"dependencies": [
"python"
]
},
"extracthosts": {
"version": "17.8fdff9e-1",
"description": "Extracts hosts (IP/Hostnames) from files.",
"dependencies": [
"python2"
]
},
"extractusnjrnl": {
"version": "7.362d4290-1",
"description": "Tool to extract the $UsnJrnl from an NTFS volume.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"eyeballer": {
"version": "143.5299227-5",
"description": "Convolutional neural network for analyzing pentest screenshots.",
"dependencies": [
"python",
"python-augmentor",
"python-click",
"python-matplotlib",
"python-numpy",
"python-pandas",
"python-pillow",
"python-scikit-learn",
"python-tensorflow",
"python-jinja",
"python-progressbar"
]
},
"eyepwn": {
"version": "1.0-3",
"description": "Exploit for Eye-Fi Helper directory traversal vulnerability",
"dependencies": [
"python2",
"python2-scapy",
"net-tools"
]
},
"eyewitness": {
"version": "1159.8a21526-4",
"description": "Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.",
"dependencies": [
"python",
"python-pyqt4",
"python-netaddr",
"ghost-py",
"python-rdpy",
"python-selenium",
"python-rsa",
"xorg-server-xvfb",
"python-beautifulsoup4",
"python-pyvirtualdisplay",
"python-fuzzywuzzy",
"python-pillow",
"geckodriver",
"firefox",
"python-easyprocess",
"python-pytesseract"
]
},
"facebash": {
"version": "17.95c3c25-1",
"description": "Facebook Brute Forcer in shellscript using TOR.",
"dependencies": [
"bash",
"tor",
"curl"
]
},
"facebookosint": {
"version": "21.656a04a-8",
"description": "OSINT tool to replace facebook graph search.",
"dependencies": [
"python",
"python-requests"
]
},
"facebot": {
"version": "23.57f6025-5",
"description": "A facebook profile and reconnaissance system.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-configparser",
"python2-facepy",
"python2-binaryornot",
"python2-wsgiref",
"python2-cookiecutter",
"python2-jinja",
"python2-yaml",
"python2-multipartposthandler",
"mysql-python",
"python2-gdata",
"python2-markupsafe",
"python2-six",
"python2-pager",
"cookiejar",
"python2-setuptools"
]
},
"facebrok": {
"version": "33.0f6fe8d-2",
"description": "Social Engineering Tool Oriented to facebook.",
"dependencies": [
"php",
"mariadb"
]
},
"facebrute": {
"version": "7.ece355b-5",
"description": "This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"factordb-pycli": {
"version": "1.3.0-8",
"description": "CLI for factordb and Python API Client.",
"dependencies": [
"python",
"python-requests"
]
},
"fakeap": {
"version": "0.3.2-5",
"description": "Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames.",
"dependencies": [
"perl"
]
},
"fakedns": {
"version": "118.39609da-5",
"description": "A regular-expression based python MITM DNS server with correct DNS request passthrough and \"Not Found\" responses.",
"dependencies": [
"python"
]
},
"fakemail": {
"version": "1.0-7",
"description": "Fake mail server that captures e-mails as files for acceptance testing.",
"dependencies": [
"python2"
]
},
"fakenetbios": {
"version": "7.b83701e-2",
"description": "A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.",
"dependencies": []
},
"fakenet-ng": {
"version": "306.6e3e72b-3",
"description": "Next Generation Dynamic Network Analysis Tool.",
"dependencies": [
"python2",
"python2-dpkt",
"python2-pyopenssl",
"python2-dnspython",
"python2-dnslib",
"python2-pydivert",
"python2-win_inet_pton",
"python2-netfilterqueue",
"python2-pyftpdlib"
]
},
"fang": {
"version": "22.4f94552-4",
"description": "A multi service threaded MD5 cracker.",
"dependencies": [
"python2"
]
},
"faradaysec": {
"version": "12846.0c01c3143-1",
"description": "Collaborative Penetration Test and Vulnerability Management Platform.",
"dependencies": [
"couchdb",
"python",
"gtk3",
"gobject-introspection",
"python-argparse",
"gobject-introspection-runtime",
"python-gobject",
"vte3",
"zsh",
"curl",
"python-couchdb",
"python-mockito",
"python-whoosh",
"python-ipy",
"python-requests",
"python-tornado",
"python-flask",
"python-anyascii",
"python-colorama",
"java-environment",
"python-pip",
"python-dateutil",
"pyqt3",
"libpqxx",
"python-psycopg2",
"ruby",
"python-apispec-webframeworks",
"python-lxml",
"python-pysqlite3",
"python-sphinx",
"python-twisted",
"python-beautifulsoup4",
"python-sqlalchemy",
"python-werkzeug",
"python-w3af-api-client",
"python-urllib3",
"python-responses",
"python-simplejson",
"python-pytz",
"python-pytest",
"python-msgpack",
"python-itsdangerous",
"python-deprecation",
"python-click",
"python-slugify",
"python-hypothesis",
"python-autobahn",
"python-pgcli",
"python-alembic",
"python-websocket-client",
"python-tqdm",
"python-flask-sqlalchemy",
"python-marshmallow",
"python-pillow",
"python-service-identity",
"python-webargs",
"python-selenium",
"python-shodan",
"python-bcrypt",
"python-simplekv",
"python-wtforms",
"python-flask-login",
"python-flask-security",
"python-pyopenssl",
"python-pyasn1",
"python-tqdm",
"python-apispec",
"python-marshmallow-sqlalchemy",
"python-flask-classful",
"python-filteralchemy-fork",
"python-filedepot",
"python-nplusone",
"python-flask-restless",
"python-syslog-rfc5424-formatter",
"python-flask-kvsession-fork",
"python-distro",
"python-faraday-plugins",
"python-pendulum",
"python-prompt_toolkit",
"python-email-validator",
"postgresql"
]
},
"fastnetmon": {
"version": "v1.1.4.r62.g780aff3-3",
"description": "High performance DoS/DDoS load analyzer built on top of multiple packet capture engines.",
"dependencies": [
"binutils",
"boost",
"hiredis",
"json-c",
"libpfring",
"log4cpp",
"luajit",
"mongo-c-driver",
"ndpi",
"numactl",
"pfring-dkms"
]
},
"favfreak": {
"version": "27.8acea5e-5",
"description": "Weaponizing favicon.ico for BugBounties , OSINT and what not.",
"dependencies": [
"python",
"python-mmh3"
]
},
"fav-up": {
"version": "54.089aa11-1",
"description": "IP lookup by favicon using Shodan.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-ipwhois",
"python-mmh3",
"python-shodan",
"python-requests",
"python-tqdm",
"python-fake-useragent"
]
},
"fbcmd": {
"version": "2.0-1",
"description": "A Command Line Interface (CLI) for Facebook",
"dependencies": []
},
"fbht": {
"version": "1:70.d75ae93-5",
"description": "A Facebook Hacking Tool",
"dependencies": [
"python2",
"python2-mechanize",
"python2-networkx",
"python2-matplotlib",
"python2-numpy",
"python2-selenium",
"python2-setuptools",
"python2-simplejson"
]
},
"fbi": {
"version": "28.0f94e99-1",
"description": "An accurate facebook account information gathering.",
"dependencies": [
"python2",
"python2-requests"
]
},
"fbid": {
"version": "16.1b35eb9-1",
"description": "Show info about the author by facebook photo url.",
"dependencies": [
"python2",
"python2-simplejson"
]
},
"fdsploit": {
"version": "26.4522f53-8",
"description": "A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests",
"python-colorama",
"python-html5lib",
"python-validators",
"python-fake-useragent"
]
},
"featherduster": {
"version": "191.9229158-3",
"description": "An automated, modular cryptanalysis tool.",
"dependencies": [
"python2",
"python2-gmpy",
"python2-pycryptodome",
"python2-ishell",
"python2-requests",
"python2-singlefile",
"readline",
"ncurses"
]
},
"fernflower": {
"version": "793.5b1461a3-1",
"description": "An analytical decompiler for Java.",
"dependencies": [
"jdk17-openjdk"
]
},
"fernmelder": {
"version": "8.030212e-1",
"description": "Asynchronous mass DNS scanner.",
"dependencies": []
},
"fernmelder-debug": {
"version": "8.030212e-1",
"description": "Detached debugging symbols for fernmelder",
"dependencies": []
},
"fern-wifi-cracker": {
"version": "301.eff2eb7-4",
"description": "WEP, WPA wifi cracker for wireless penetration testing.",
"dependencies": [
"python",
"python-pyqt5",
"aircrack-ng",
"xterm",
"subversion",
"python-scapy",
"macchanger"
]
},
"feroxbuster": {
"version": "1:v2.11.0.r1.g3b0e530-1",
"description": "A fast, simple, recursive content discovery tool written in Rust.",
"dependencies": [
"openssl",
"pkgconf"
]
},
"feroxbuster-debug": {
"version": "1:v2.11.0.r1.g3b0e530-1",
"description": "Detached debugging symbols for feroxbuster",
"dependencies": []
},
"ferret": {
"version": "0.7-1",
"description": "Free Entity Relationship and SQL Tables autogeneration Tool. Exports to MySQL, Postgres, XML, SQL95",
"dependencies": []
},
"ffm": {
"version": "129.6337eaf-5",
"description": "A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement.",
"dependencies": [
"python",
"python-tqdm"
]
},
"ffuf": {
"version": "1:v2.1.0.r3.gde9ac86-1",
"description": "Fast web fuzzer written in Go.",
"dependencies": []
},
"ffuf-scripts": {
"version": "1.2192bf7-1",
"description": "Scripts and snippets for ffuf payloads.",
"dependencies": []
},
"fgscanner": {
"version": "11.893372c-2",
"description": "An advanced, opensource URL scanner.",
"dependencies": [
"perl",
"perl-io-socket-portstate",
"perl-libwww",
"perl-getopt-long"
]
},
"fhttp": {
"version": "1.3-6",
"description": "This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.",
"dependencies": [
"perl",
"perl-io-socket",
"perl-switch"
]
},
"fi6s": {
"version": "195.1380b86-1",
"description": "IPv6 network scanner designed to be fast.",
"dependencies": [
"libpcap"
]
},
"fi6s-debug": {
"version": "195.1380b86-1",
"description": "Detached debugging symbols for fi6s",
"dependencies": []
},
"fierce": {
"version": "145.965840d-1",
"description": "A DNS reconnaissance tool for locating non-contiguous IP space.",
"dependencies": [
"python",
"python-dnspython"
]
},
"fiked": {
"version": "0.0.5-6",
"description": "Fake IDE daemon",
"dependencies": []
},
"filebuster": {
"version": "95.f2b04c7-3",
"description": "An extremely fast and flexible web fuzzer.",
"dependencies": [
"perl",
"perl-yaml",
"perl-switch",
"perl-net-dns",
"perl-list-moreutils",
"perl-io-socket-ssl",
"perl-io-socket-socks-wrapper",
"perl-uri",
"perl-furl",
"perl-http-parser-xs",
"perl-class-accessor-lite",
"perl-cache-lru",
"perl-net-dns-lite",
"perl-exporter-tiny",
"perl-io-async",
"perl-html-parser"
]
},
"filefuzz": {
"version": "1.0-4",
"description": "A binary file fuzzer for Windows with several options.",
"dependencies": []
},
"filegps": {
"version": "90.03cbc75-3",
"description": "A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it.",
"dependencies": [
"python2",
"python2-argparse",
"python2-requests"
]
},
"fileintel": {
"version": "33.a0bff38-4",
"description": "A modular Python application to pull intelligence about malicious files.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-requests",
"python2-otxv2",
"python2-virustotal-api",
"python2-threatcrowd",
"python2-configparser"
]
},
"filibuster": {
"version": "167.c54ac80-2",
"description": "A Egress filter mapping application with additional functionality.",
"dependencies": [
"python2",
"python2-numpy",
"python2-configparser",
"python2-dnspython",
"python2-pyliblzma",
"python2-pycryptodome"
]
},
"fimap": {
"version": "2:1.00-5",
"description": "A little tool for local and remote file inclusion auditing and exploitation",
"dependencies": []
},
"finalrecon": {
"version": "194.f1abf5a-4",
"description": "OSINT Tool for All-In-One Web Reconnaissance.",
"dependencies": [
"python",
"python-requests",
"python-ipwhois",
"python-beautifulsoup4",
"python-lxml",
"python-argparse",
"python-icmplib",
"python-tldextract",
"python-dnslib",
"python-aiohttp",
"python-psycopg2",
"python-aiodns"
]
},
"find3": {
"version": "604.5964026-1",
"description": "High-precision indoor positioning framework.",
"dependencies": [
"glibc"
]
},
"find-dns": {
"version": "0.1-6",
"description": "A tool that scans networks looking for DNS servers.",
"dependencies": [
"python2"
]
},
"findmyhash": {
"version": "1.1.2-9",
"description": "Crack different types of hashes using free online services.",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"findmyiphone": {
"version": "19.aef3ac8-1",
"description": "Locates all devices associated with an iCloud account",
"dependencies": [
"python2"
]
},
"findsploit": {
"version": "87.3e61d8d-1",
"description": "Find exploits in local and online databases instantly.",
"dependencies": [
"bash",
"metasploit",
"firefox",
"exploitdb"
]
},
"fingerprinter": {
"version": "480.105ab04-4",
"description": "CMS/LMS/Library etc Versions Fingerprinter.",
"dependencies": [
"ruby",
"ruby-pkg-config",
"libxslt",
"ruby-bundler"
]
},
"firecat": {
"version": "6.b5205c8-2",
"description": "A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.",
"dependencies": []
},
"firefox-decrypt": {
"version": "1.1.1.r5.g8a5fdeb-4",
"description": "Extract passwords from Mozilla Firefox, Waterfox, Thunderbird, SeaMonkey profiles.",
"dependencies": [
"python",
"python-pysqlite3",
"nss"
]
},
"firefox-security-toolkit": {
"version": "16.31dacf0-1",
"description": "A tool that transforms Firefox browsers into a penetration testing suite.",
"dependencies": [
"bash",
"wget",
"firefox"
]
},
"fireprox": {
"version": "51.a6e1300-5",
"description": "AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"firewalk": {
"version": "5.0-5",
"description": "An active reconnaissance network security tool.",
"dependencies": [
"libdnet",
"libnet",
"libpcap"
]
},
"firmwalker": {
"version": "101.23ff299-1",
"description": "Script for searching the extracted firmware file system for goodies.",
"dependencies": [
"bash"
]
},
"firmware-mod-kit": {
"version": "149.8403a17-1",
"description": "Modify firmware images without recompiling.",
"dependencies": [
"python-magic"
]
},
"firstexecution": {
"version": "6.a275793-3",
"description": "A Collection of different ways to execute code outside of the expected entry points.",
"dependencies": []
},
"firstorder": {
"version": "8.107eb6a-3",
"description": "A traffic analyzer to evade Empire communication from Anomaly-Based IDS.",
"dependencies": [
"python2",
"python2-scapy",
"python2-requests",
"python2-scapy-http"
]
},
"fl0p": {
"version": "0.1-3",
"description": "A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks.",
"dependencies": [
"libpcap"
]
},
"fl0p-debug": {
"version": "0.1-3",
"description": "Detached debugging symbols for fl0p",
"dependencies": []
},
"flare": {
"version": "0.6-4",
"description": "Flare processes an SWF and extracts all scripts from it.",
"dependencies": [
"lib32-zlib"
]
},
"flare-floss": {
"version": "1:v3.1.1.r55.g8691768-1",
"description": "Obfuscated String Solver - Automatically extract obfuscated strings from malware.",
"dependencies": [
"python",
"python-tabulate",
"vivisect",
"python-viv-utils",
"python-pydantic",
"python-tqdm",
"python-networkx",
"python-halo",
"python-rich",
"python-pefile"
]
},
"flashlight": {
"version": "109.90d1dc5-3",
"description": "Automated Information Gathering Tool for Penetration Testers.",
"dependencies": [
"python2",
"python2-yaml"
]
},
"flashscanner": {
"version": "11.6815b02-7",
"description": "Flash XSS Scanner.",
"dependencies": [
"perl",
"perl-uri",
"perl-libwww"
]
},
"flashsploit": {
"version": "23.c465a6d-5",
"description": "Exploitation Framework for ATtiny85 Based HID Attacks.",
"dependencies": [
"python",
"openssh",
"php",
"metasploit"
]
},
"flask-session-cookie-manager2": {
"version": "v1.2.2.r1.g3c271d2-1",
"description": "Decode and encode Flask session cookie.",
"dependencies": [
"python2",
"python2-itsdangerous",
"python2-flask"
]
},
"flask-session-cookie-manager3": {
"version": "v1.2.2.r1.g3c271d2-1",
"description": "Decode and encode Flask session cookie.",
"dependencies": [
"python",
"python-itsdangerous",
"python-flask"
]
},
"flask-unsign": {
"version": "1:v1.2.1.r0.g6e6e91d-4",
"description": "Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.",
"dependencies": [
"python",
"python-flask",
"python-requests",
"python-itsdangerous",
"python-markupsafe",
"python-werkzeug"
]
},
"flasm": {
"version": "1.62-5",
"description": "Disassembler tool for SWF bytecode",
"dependencies": []
},
"flowinspect": {
"version": "97.34759ed-3",
"description": "A network traffic inspection tool.",
"dependencies": [
"python2",
"python2-pylibemu",
"python2-re2",
"python2-pynids",
"python2-yara",
"python2-fuzzywuzzy"
]
},
"flunym0us": {
"version": "2.0-3",
"description": "A Vulnerability Scanner for Wordpress and Moodle.",
"dependencies": []
},
"fluxion": {
"version": "4:v4.10.r240.g4f461a4-1",
"description": "A security auditing and social-engineering research tool.",
"dependencies": [
"aircrack-ng",
"bash>=4.2",
"coreutils",
"awk",
"iw",
"unzip",
"curl",
"bc",
"xterm",
"cowpatty",
"dhcp",
"dsniff",
"p7zip",
"hostapd",
"lighttpd",
"macchanger",
"mdk3",
"mdk4",
"nmap",
"php-cgi",
"xorg-xdpyinfo"
]
},
"flyr": {
"version": "76.4926ecc-1",
"description": "Block-based software vulnerability fuzzing framework.",
"dependencies": []
},
"fockcache": {
"version": "10.3e7efa9-2",
"description": "Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages.",
"dependencies": []
},
"forager": {
"version": "115.7439b0a-10",
"description": "Multithreaded threat Intelligence gathering utilizing.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"foresight": {
"version": "57.6f48984-10",
"description": "A tool for predicting the output of random number generators.",
"dependencies": [
"python",
"python-argparse"
]
},
"forkingportscanner": {
"version": "1-2",
"description": "Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1-65535. Has the ability to scan UDP or TCP, defaults to tcp.",
"dependencies": []
},
"formatstringexploiter": {
"version": "107.2810293-5",
"description": "Helper script for working with format string bugs.",
"dependencies": [
"python",
"python-prettytable",
"python-pwntools",
"python-pytest",
"python-recommonmark",
"python-sphinx",
"python-sphinx_rtd_theme",
"python-sphinxcontrib-napoleon"
]
},
"fortiscan": {
"version": "0.7.r7.gd54faa0-3",
"description": "A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.",
"dependencies": [
"glibc"
]
},
"fpdns": {
"version": "2:109.655bfa7-1",
"description": "Program that remotely determines DNS server versions.",
"dependencies": [
"perl",
"perl-net-dns"
]
},
"fport": {
"version": "2.0-6",
"description": "Identify unknown open ports and their associated applications.",
"dependencies": []
},
"fprotlogparser": {
"version": "1-2",
"description": "This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.",
"dependencies": []
},
"fraud-bridge": {
"version": "10.775c563-4",
"description": "ICMP and DNS tunneling via IPv4 and IPv6.",
"dependencies": []
},
"fred": {
"version": "0.1.1-3",
"description": "Cross-platform M$ registry hive editor.",
"dependencies": [
"hivex",
"qt4",
"qtwebkit"
]
},
"freewifi": {
"version": "30.1cb752b-9",
"description": "How to get free wifi.",
"dependencies": [
"python",
"python-netifaces",
"python-tqdm",
"python-netaddr",
"python-argparse",
"python-wireless",
"python-spoofmac"
]
},
"frida-debug": {
"version": "15.2.2-3",
"description": "Detached debugging symbols for frida",
"dependencies": []
},
"frida-extract": {
"version": "13.abb3f14-3",
"description": "Frida.re based RunPE (and MapViewOfSection) extraction tool.",
"dependencies": [
"python2-frida",
"python2-argparse"
]
},
"frida-ios-dump": {
"version": "53.56e99b2-3",
"description": "Pull decrypted ipa from jailbreak device.",
"dependencies": [
"python2",
"python2-paramiko",
"python2-tqdm",
"python2-argparse",
"python2-six",
"python2-pyasn1",
"python2-prompt_toolkit",
"python2-enum34",
"python2-colorama",
"python2-frida-tools",
"python2-idna",
"python2-ipaddress",
"python2-scp",
"python2-wcwidth",
"python2-pycparser",
"python2-pygments",
"python2-pynacl",
"python2-cffi",
"python2-bcrypt"
]
},
"fridump": {
"version": "23.3e64ee0-4",
"description": "A universal memory dumper using Frida.",
"dependencies": [
"python2",
"python2-frida"
]
},
"frisbeelite": {
"version": "1.2-8",
"description": "A GUI-based USB device fuzzer.",
"dependencies": [
"python2",
"libusb",
"python2-pyusb",
"wxgtk3",
"python2-wxpython3"
]
},
"fscan": {
"version": "2.0.0.build4.r0.g4aaa05f-1",
"description": "A Security Auditing Tool.",
"dependencies": []
},
"fscan-debug": {
"version": "2.0.0.build4.r0.g4aaa05f-1",
"description": "Detached debugging symbols for fscan",
"dependencies": []
},
"f-scrack": {
"version": "19.9a00357-2",
"description": "A single file bruteforcer supports multi-protocol.",
"dependencies": [
"python2"
]
},
"fs-exploit": {
"version": "3.28bb9bb-2",
"description": "Format string exploit generation.",
"dependencies": [
"python2"
]
},
"fsnoop": {
"version": "3.4-2",
"description": "A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called \"payload modules\" or \"paymods\").",
"dependencies": [
"glibc"
]
},
"fs-nyarl": {
"version": "1.0-7",
"description": "A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.",
"dependencies": [
"chaosreader",
"ettercap",
"dsniff",
"arp-scan",
"beef",
"p0f",
"mitmproxy",
"tcpdump",
"metasploit",
"macchanger",
"hamster",
"foremost",
"sslstrip",
"sslsplit"
]
},
"fssb": {
"version": "73.51d2ac2-1",
"description": "A low-level filesystem sandbox for Linux using syscall intercepts.",
"dependencies": [
"openssl"
]
},
"fstealer": {
"version": "0.1-7",
"description": "Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines.",
"dependencies": [
"python2",
"python2-simplejson"
]
},
"ftester": {
"version": "1.0-5",
"description": "A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.",
"dependencies": [
"perl",
"perl-netpacket",
"perl-net-rawip",
"perl-net-pcaputils"
]
},
"ftp-fuzz": {
"version": "1:1337-5",
"description": "The master of all master fuzzing scripts specifically targeted towards FTP server software.",
"dependencies": []
},
"ftplib": {
"version": "4.0-2",
"description": "A set of routines that implement the FTP protocol.",
"dependencies": []
},
"ftpmap": {
"version": "52.cbeabbe-1",
"description": "Scans remote FTP servers to identify what software and what versions they are running.",
"dependencies": []
},
"ftp-scanner": {
"version": "0.2.5-1",
"description": "Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris.",
"dependencies": []
},
"ftpscout": {
"version": "12.cf1dff1-11",
"description": "Scans ftps for anonymous access.",
"dependencies": [
"python",
"python-colorama",
"python-pika",
"python-netaddr",
"rabbitmq"
]
},
"ftp-spider": {
"version": "1.0-7",
"description": "FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.",
"dependencies": [
"perl",
"perl-data-dumper"
]
},
"fuddly": {
"version": "569.fd2c4d0-3",
"description": "Fuzzing and Data Manipulation Framework (for GNU/Linux).",
"dependencies": [
"python2",
"python2-pycups",
"python2-rpyc",
"python2-pysqlite",
"python2-crcmod",
"python2-xtermcolor",
"sqlite",
"python2-enum34"
]
},
"fusil": {
"version": "1.5-4",
"description": "A Python library used to write fuzzing programs.",
"dependencies": [
"python2",
"python2-ptrace"
]
},
"fuxploider": {
"version": "140.ec8742b-7",
"description": "Tool that automates the process of detecting and exploiting file upload forms flaws.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"python-coloredlogs",
"python-beautifulsoup4"
]
},
"fuzzap": {
"version": "17.057002b-5",
"description": "A python script for obfuscating wireless networks.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"fuzzball2": {
"version": "0.7-3",
"description": "A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.",
"dependencies": []
},
"fuzzbunch": {
"version": "32.2b76c22-1",
"description": "NSA Exploit framework",
"dependencies": [
"wine",
"winetricks"
]
},
"fuzzdb": {
"version": "475.5656ab2-3",
"description": "Attack and Discovery Pattern Dictionary for Application Fault Injection Testing.",
"dependencies": [
"python2"
]
},
"fuzzdiff": {
"version": "1.0-1",
"description": "A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.",
"dependencies": []
},
"fuzzowski": {
"version": "41.e39f665-6",
"description": "A Network Protocol Fuzzer made by NCCGroup based on Sulley and BooFuzz.",
"dependencies": [
"python",
"python-prompt_toolkit",
"python-attrs",
"python-pygments",
"python-pydot"
]
},
"fuzztalk": {
"version": "1.0.0.0-2",
"description": "An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.",
"dependencies": []
},
"g72x++": {
"version": "1-2",
"description": "Decoder for the g72x++ codec.",
"dependencies": []
},
"gadgetinspector": {
"version": "6.ac7832d-1",
"description": "A byte code analyzer for finding deserialization gadget chains in Java applications.",
"dependencies": [
"java-runtime"
]
},
"gadgettojscript": {
"version": "20.005cb8b-1",
"description": ".NET serialized gadgets that can trigger .NET assembly from JS/VBS/VBA based scripts.",
"dependencies": [
"mono"
]
},
"galleta": {
"version": "20040505_1-5",
"description": "Examine the contents of the IE's cookie files for forensic purposes",
"dependencies": []
},
"garminusb2nmea": {
"version": "0.12a-1",
"description": "Garmin USB to NMEA protocol converter",
"dependencies": []
},
"gasmask": {
"version": "172.2527371-7",
"description": "All in one Information gathering tool - OSINT.",
"dependencies": [
"python",
"python-requests",
"python-dnspython",
"python-python-whois",
"python-validators",
"python-censys",
"python-shodan"
]
},
"gatecrasher": {
"version": "2.3ad5225-3",
"description": "Network auditing and analysis tool developed in Python.",
"dependencies": [
"python2"
]
},
"gau": {
"version": "169.bfc58a0-1",
"description": "Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.",
"dependencies": []
},
"gau-debug": {
"version": "169.bfc58a0-1",
"description": "Detached debugging symbols for gau",
"dependencies": []
},
"gcat": {
"version": "29.39b266c-3",
"description": "A fully featured backdoor that uses Gmail as a C&C server.",
"dependencies": [
"python2",
"python2-argparse"
]
},
"gconf": {
"version": "3.2.6+11+g07808097-6",
"description": "An obsolete configuration database system.",
"dependencies": [
"libxml2",
"polkit",
"libldap",
"dbus-glib",
"python2"
]
},
"gcpbucketbrute": {
"version": "17.6866bd2-5",
"description": "A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.",
"dependencies": [
"python",
"python-requests",
"python-google-cloud-storage"
]
},
"gcrypt": {
"version": "1:32.d3f9f06-1",
"description": "Simple, secure and performance file encryption tool written in C",
"dependencies": [
"glibc",
"libbsd"
]
},
"gcrypt-debug": {
"version": "1:32.d3f9f06-1",
"description": "Detached debugging symbols for gcrypt",
"dependencies": []
},
"gdbgui": {
"version": "1:437.be95217-5",
"description": "Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust.",
"dependencies": [
"python",
"python-eventlet",
"python-flask",
"python-flask-socketio",
"python-pygdbmi",
"python-pypugjs",
"python-enum-compat",
"python-gevent",
"python-pygments",
"python-flask-compress",
"python-brotli",
"gdb"
]
},
"gene": {
"version": "78.faf8cc0-1",
"description": "Signature Engine for Windows Event Logs.",
"dependencies": []
},
"genisys": {
"version": "53.d53bb0c-4",
"description": "Powerful Telegram Members Scraping and Adding Toolkit.",
"dependencies": [
"python",
"python-telethon",
"python-keyboard",
"python-colorama",
"python-pyfiglet"
]
},
"genlist": {
"version": "1:0.1-3",
"description": "Generates lists of IP addresses.",
"dependencies": []
},
"geoedge": {
"version": "0.2-7",
"description": "This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).",
"dependencies": [
"python"
]
},
"geoipgen": {
"version": "0.4-2",
"description": "GeoIPgen is a country to IP addresses generator.",
"dependencies": []
},
"gerix-wifi-cracker": {
"version": "1.1c3cd73-4",
"description": "A graphical user interface for aircrack-ng and pyrit.",
"dependencies": [
"aircrack-ng",
"xterm",
"pyqt3",
"python2"
]
},
"gethsploit": {
"version": "3.144778b-3",
"description": "Finding Ethereum nodes which are vulnerable to RPC-attacks.",
"dependencies": [
"python2",
"python2-yaml"
]
},
"getsids": {
"version": "0.0.1-3",
"description": "Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing \u2018lsnrctl service\u2019.",
"dependencies": []
},
"getsploit": {
"version": "37.bcab2ee-5",
"description": "Command line utility for searching and downloading exploits.",
"dependencies": [
"python",
"python-six",
"python-texttable",
"python-clint",
"python-vulners",
"python-appdirs"
]
},
"gf": {
"version": "39.dcd4c36-1",
"description": "A wrapper around grep, to help you grep for things.",
"dependencies": [
"glibc"
]
},
"gggooglescan": {
"version": "0.4-4",
"description": "A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.",
"dependencies": [
"bash",
"curl",
"perl"
]
},
"gg-images": {
"version": "35.b2dd863-3",
"description": "The application was created to allow anyone to easily download profile pictures from GG.",
"dependencies": []
},
"gg-images-debug": {
"version": "35.b2dd863-3",
"description": "Detached debugging symbols for gg-images",
"dependencies": []
},
"ghauri": {
"version": "1.4.1.r0.g316410a-4",
"description": "An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws.",
"dependencies": [
"python"
]
},
"ghc": {
"version": "8.2.1-1",
"description": "The Glasgow Haskell Compiler",
"dependencies": [
"ghc-libs"
]
},
"gh-dork": {
"version": "3.799f86f-8",
"description": "Github dorking tool.",
"dependencies": [
"python",
"python-github3.py",
"python-pyjwt"
]
},
"ghettotooth": {
"version": "1.0-3",
"description": "Ghettodriving for bluetooth.",
"dependencies": [
"perl"
]
},
"ghostdelivery": {
"version": "32.a23ed5a-1",
"description": "Python script to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions.",
"dependencies": [
"python2"
]
},
"ghostpack": {
"version": "123.20a5f0a-1",
"description": "Compiled Binaries for Ghostpack (.NET v4.8.1).",
"dependencies": []
},
"ghost-phisher": {
"version": "1.62-5",
"description": "GUI suite for phishing and penetration attacks",
"dependencies": []
},
"ghost-py": {
"version": "2.0.0-4",
"description": "Webkit based webclient (relies on PyQT).",
"dependencies": [
"python2",
"python2-pyqt"
]
},
"ghunt": {
"version": "v2.2.0.r12.g71f0144-1",
"description": "An offensive OSINT Google framework.",
"dependencies": [
"python",
"python-geopy",
"python-httpx",
"python-imagehash",
"python-pillow",
"python-dateutil",
"python-rich",
"python-beautifultable",
"python-beautifulsoup4",
"python-alive-progress",
"python-protobuf",
"python-autoslot",
"python-humanize",
"python-inflection",
"python-jsonpickle",
"python-packaging",
"python-rich-argparse",
"python-dnspython"
]
},
"gibberish-detector": {
"version": "v0.1.1.r2.gecac969-5",
"description": "Train a model and detect gibberish strings with it.",
"dependencies": [
"python"
]
},
"girsh-debug": {
"version": "v0.41.r0.gfc5b44e-1",
"description": "Detached debugging symbols for girsh",
"dependencies": []
},
"girsh": {
"version": "v0.41.r0.gfc5b44e-1",
"description": "Automatically spawn a reverse shell fully interactive for Linux or Windows victim.",
"dependencies": []
},
"giskismet": {
"version": "20110805-6",
"description": "A program to visually represent the Kismet data in a flexible manner.",
"dependencies": []
},
"gitdorker": {
"version": "113.8199375-7",
"description": "Python program to scrape secrets from GitHub through usage of a large repository of dorks.",
"dependencies": [
"python",
"python-requests",
"python-termcolor",
"python-tqdm"
]
},
"gitdump": {
"version": "1.682fa37-8",
"description": "A pentesting tool that dumps the source code from .git even when the directory traversal is disabled.",
"dependencies": [
"python",
"python-requests"
]
},
"git-dump": {
"version": "7.4c9a2a9-1",
"description": "Dump the contents of a remote git repository without directory listing enabled.",
"dependencies": [
"nodejs",
"git"
]
},
"git-dumper": {
"version": "1:1.0.8.r0.gd0e7067-4",
"description": "A tool to dump a git repository from a website.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-dulwich",
"python-pysocks",
"python-requests"
]
},
"gitem": {
"version": "104.d40a1c9-8",
"description": "A Github organization reconnaissance tool.",
"dependencies": [
"python",
"python-requests"
]
},
"gitgraber": {
"version": "82.aab4839-4",
"description": "Monitor GitHub to search and find sensitive data in real time for different online services.",
"dependencies": [
"python",
"python-requests",
"python-argcomplete",
"python-python-crontab",
"python-termcolor"
]
},
"githack": {
"version": "16.a3d70b1-3",
"description": "A `.git` folder disclosure exploit.",
"dependencies": [
"python2"
]
},
"git-hound": {
"version": "174.1d20536-1",
"description": "Pinpoints exposed API keys on GitHub. A batch-catching, pattern-matching, patch-attacking secret snatcher.",
"dependencies": []
},
"git-hound-debug": {
"version": "174.1d20536-1",
"description": "Detached debugging symbols for git-hound",
"dependencies": []
},
"githound-debug": {
"version": "v1.7.1.r15.g1d20536-1",
"description": "Detached debugging symbols for githound",
"dependencies": []
},
"githound": {
"version": "v1.7.1.r15.g1d20536-1",
"description": "Find secret information in git repositories.",
"dependencies": []
},
"githubcloner": {
"version": "35.2bcb9c2-7",
"description": "A script that clones Github repositories of users and organizations automatically.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"python-gitpython"
]
},
"github-dorks": {
"version": "86.af9295e-1",
"description": "Collection of github dorks and helper tool to automate the process of checking dorks.",
"dependencies": [
"python",
"python-feedparser",
"python-github3.py",
"python-deprecated",
"python-pyjwt"
]
},
"gitleaks-debug": {
"version": "979.b496677-1",
"description": "Detached debugging symbols for gitleaks",
"dependencies": []
},
"gitmails": {
"version": "71.8aa8411-8",
"description": "An information gathering tool to collect git commit emails in version control host services.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"python-tabulate",
"python-pygit2"
]
},
"gitminer": {
"version": "54.16ada58-8",
"description": "Tool for advanced mining for content on Github.",
"dependencies": [
"python",
"python-lxml",
"python-requests"
]
},
"gitrecon": {
"version": "30.6467e78-7",
"description": "OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.",
"dependencies": [
"python",
"python-requests",
"python-rich"
]
},
"gitrob": {
"version": "7.7be4c53-3",
"description": "Reconnaissance tool for GitHub organizations.",
"dependencies": [
"glibc"
]
},
"gittools": {
"version": "70.7cac63a-3",
"description": "A repository with 3 tools for pwn'ing websites with .git repositories available'.",
"dependencies": [
"python2",
"curl",
"git"
]
},
"git-wild-hunt": {
"version": "16.6495672-6",
"description": "A tool to hunt for credentials in github wild AKA git*hunt.",
"dependencies": [
"python",
"python-urllib3",
"python-certifi",
"python-chardet",
"python-idna",
"python-tqdm",
"python-requests"
]
},
"gksu": {
"version": "2.0.2-7",
"description": "A graphical frontend for su.",
"dependencies": [
"libgksu",
"xorg-xauth"
]
},
"gloom": {
"version": "1:93.cd6e927-1",
"description": "Linux Penetration Testing Framework.",
"dependencies": [
"python2",
"python2-mechanize",
"python2-pythonwhois",
"python2-requests",
"python2-termcolor",
"python2-dateutil",
"python2-beautifulsoup4",
"python2-geoip",
"python2-scapy",
"wifijammer",
"nmap",
"curl"
]
},
"glue": {
"version": "380.8703380-8",
"description": "A framework for running a series of tools.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"gmsadumper": {
"version": "18.e03187c-5",
"description": "A tool that Reads any gMSA password blobs the user can access and parses the values.",
"dependencies": [
"python",
"python-ldap3",
"impacket",
"python-pycryptodomex"
]
},
"gnupg-debug": {
"version": "2.2.41-3",
"description": "Detached debugging symbols for gnupg",
"dependencies": []
},
"gnutls2": {
"version": "2.12.23-1",
"description": "A library which provides a secure layer over a reliable transport layer (Version 2)",
"dependencies": []
},
"gobd": {
"version": "82.3bbd17c-4",
"description": "A Golang covert backdoor.",
"dependencies": [
"libpcap"
]
},
"gobuster": {
"version": "2:367.308cf9f-1",
"description": "Directory/file & DNS busting tool written in Go.",
"dependencies": []
},
"gobuster-debug": {
"version": "2:367.308cf9f-1",
"description": "Detached debugging symbols for gobuster",
"dependencies": []
},
"gocabrito": {
"version": "4.33ac59a-4",
"description": "Super organized and flexible script for sending phishing campaigns.",
"dependencies": [
"ruby",
"ruby-bundler",
"ruby-mail",
"ruby-json",
"ruby-sqlite3",
"sqlite3"
]
},
"goddi": {
"version": "1.2-2",
"description": "Dumps Active Directory domain information.",
"dependencies": [
"glibc"
]
},
"go-exploitdb-debug": {
"version": "v0.5.0.r4.g51689ca-1",
"description": "Detached debugging symbols for go-exploitdb",
"dependencies": []
},
"go-exploitdb": {
"version": "v0.5.0.r4.g51689ca-1",
"description": "Tool for searching Exploits from Exploit Databases, etc.",
"dependencies": []
},
"golang-glide": {
"version": "1093.b94b39d-1",
"description": "Vendor Package Management for Golang.",
"dependencies": []
},
"goldeneye": {
"version": "28.792862f-5",
"description": "A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.",
"dependencies": [
"python"
]
},
"golismero": {
"version": "73.7d605b9-3",
"description": "Opensource web security testing framework.",
"dependencies": [
"python2",
"python2-beautifulsoup3",
"python2-colorizer",
"python2-yaml",
"python2-decorator",
"python2-django",
"python2-dnspython",
"python2-pycurl",
"python2-netaddr",
"python2-nltk",
"python2-cjson",
"python2-requests",
"python2-requests-ntlm",
"python2-texttable",
"python2-tldextract",
"python2-docutils",
"python2-argcomplete",
"python2-pymongo",
"python2-simplejson",
"python2-pysqlite",
"python2-psycopg2",
"python2-argparse"
]
},
"gomapenum-debug": {
"version": "v1.1.0.r110.g8b344df-1",
"description": "Detached debugging symbols for gomapenum",
"dependencies": []
},
"gomapenum": {
"version": "v1.1.0.r110.g8b344df-1",
"description": "User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin.",
"dependencies": [
"glibc"
]
},
"goocanvas1": {
"version": "1.0.0-1",
"description": "A cairo canvas widget for GTK+.",
"dependencies": [
"gtk2"
]
},
"goodork": {
"version": "2.2-9",
"description": "A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.",
"dependencies": [
"python2",
"git",
"python2-beautifulsoup4"
]
},
"goofile": {
"version": "1.5-3",
"description": "Command line filetype search",
"dependencies": []
},
"goofuzz": {
"version": "1.2.5.r2.g6ba4cc5-1",
"description": "A Bash script that uses advanced Google search techniques to obtain sensitive information in files or directories without making requests to the web server.",
"dependencies": [
"curl",
"sed"
]
},
"google-explorer": {
"version": "140.0b21b57-8",
"description": "Google mass exploit robot - Make a google search, and parse the results for a especific exploit you define.",
"dependencies": [
"python",
"python-selenium",
"python-docopt",
"python-colorama",
"python-requests",
"python-lxml",
"python-beautifulsoup4",
"chromium"
]
},
"googlesub": {
"version": "14.a7a3cc7-4",
"description": "A python script to find domains by using google dorks.",
"dependencies": [
"python2",
"python2-requests",
"python2-beautifulsoup4"
]
},
"goog-mail": {
"version": "1.0-2",
"description": "Enumerate domain emails from google.",
"dependencies": [
"python2"
]
},
"goohak": {
"version": "31.815a31e-1",
"description": "Automatically Launch Google Hacking Queries Against A Target Domain.",
"dependencies": [
"bash"
]
},
"goop": {
"version": "12.39b34eb-10",
"description": "Perform google searches without being blocked by the CAPTCHA or hitting any rate limits.",
"dependencies": [
"python",
"python-requests"
]
},
"goop-dump": {
"version": "71.3c15d60-1",
"description": "Tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.",
"dependencies": []
},
"goop-dump-debug": {
"version": "71.3c15d60-1",
"description": "Detached debugging symbols for goop-dump",
"dependencies": []
},
"gooscan": {
"version": "1.0.9-4",
"description": "A tool that automates queries against Google search appliances, but with a twist.",
"dependencies": []
},
"gopherus": {
"version": "33.90a2fd5-3",
"description": "Tool generates gopher link for exploiting SSRF and gaining RCE in various servers.",
"dependencies": [
"python2",
"python2-argparse",
"python2-requests"
]
},
"gophish": {
"version": "815.95618469-1",
"description": "Open-Source Phishing Framework.",
"dependencies": []
},
"gophish-debug": {
"version": "815.95618469-1",
"description": "Detached debugging symbols for gophish",
"dependencies": []
},
"goshs": {
"version": "0.3.8-1",
"description": "A SimpleHTTPServer written in Go, enhanced with features and with a nice design.",
"dependencies": []
},
"goshs-debug": {
"version": "0.3.8-1",
"description": "Detached debugging symbols for goshs",
"dependencies": []
},
"gosint": {
"version": "196.9c86ed2-2",
"description": "OSINT framework in Go.",
"dependencies": [
"glibc",
"tesseract"
]
},
"gospider": {
"version": "108.f6cc9a7-1",
"description": "Fast web spider written in Go.",
"dependencies": []
},
"gospider-debug": {
"version": "108.f6cc9a7-1",
"description": "Detached debugging symbols for gospider",
"dependencies": []
},
"gostringsr2": {
"version": "1.1.2-7",
"description": "Extract strings from a Go binary using radare2.",
"dependencies": [
"python",
"radare2",
"python-r2pipe",
"python-click"
]
},
"go-windapsearch-debug": {
"version": "v0.3.0.r22.ged05587-2",
"description": "Detached debugging symbols for go-windapsearch",
"dependencies": []
},
"go-windapsearch": {
"version": "v0.3.0.r22.ged05587-2",
"description": "Utility to enumerate users, groups and computers from a Windows domain through LDAP queries.",
"dependencies": []
},
"gowitness": {
"version": "453.db5d3fc-1",
"description": "A golang, web screenshot utility using Chrome Headless.",
"dependencies": [
"chromium"
]
},
"gowitness-debug": {
"version": "453.db5d3fc-1",
"description": "Detached debugging symbols for gowitness",
"dependencies": []
},
"gplist": {
"version": "1.0-2",
"description": "Lists information about the applied Group Policies.",
"dependencies": []
},
"gpocrack": {
"version": "3.cf63c86-8",
"description": "Active Directory Group Policy Preferences cpassword cracker/decrypter.",
"dependencies": [
"python",
"python-pycryptodome"
]
},
"gpowned": {
"version": "19.a85bcf6-1",
"description": "GPOs manipulation tool.",
"dependencies": [
"impacket",
"python",
"python-ldap3"
]
},
"gpp-decrypt": {
"version": "14.c71c7a6-1",
"description": "Parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.",
"dependencies": [
"python",
"python-colorama",
"python-crypto"
]
},
"gpredict": {
"version": "1647.91a4a3f-1",
"description": "A real-time satellite tracking and orbit prediction application.",
"dependencies": [
"curl",
"gtk3",
"glib2",
"grig",
"goocanvas",
"hamlib"
]
},
"gpredict-debug": {
"version": "1647.91a4a3f-1",
"description": "Detached debugging symbols for gpredict",
"dependencies": []
},
"gps-sdr-sim": {
"version": "224.28ca29a-1",
"description": "Software-Defined GPS Signal Simulator.",
"dependencies": [
"python2",
"gnuradio",
"hackrf",
"bladerf",
"gnuradio-osmosdr"
]
},
"gps-sdr-sim-debug": {
"version": "224.28ca29a-1",
"description": "Detached debugging symbols for gps-sdr-sim",
"dependencies": []
},
"gqrx-debug": {
"version": "2.17.5-2",
"description": "Detached debugging symbols for gqrx",
"dependencies": []
},
"gqrx-scanner": {
"version": "1.0.5-1",
"description": "A frequency scanner for Gqrx Software Defined Radio receiver.",
"dependencies": [
"glibc"
]
},
"gqrx-scanner-debug": {
"version": "1.0.5-1",
"description": "Detached debugging symbols for gqrx-scanner",
"dependencies": []
},
"grabbb": {
"version": "0.0.7-2",
"description": "Clean, functional, and fast banner scanner.",
"dependencies": []
},
"grabber": {
"version": "0.1-11",
"description": "A web application scanner. Basically it detects some kind of vulnerabilities in your website.",
"dependencies": [
"python"
]
},
"grabing": {
"version": "11.9c1aa6c-1",
"description": "Counts all the hostnames for an IP adress",
"dependencies": [
"python2"
]
},
"grabitall": {
"version": "1.1-1",
"description": "Performs traffic redirection by sending spoofed ARP replies.",
"dependencies": []
},
"graffiti": {
"version": "24.4af61b4-3",
"description": "A tool to generate obfuscated one liners to aid in penetration testing.",
"dependencies": [
"python2",
"python2-argparse",
"python2-crypto"
]
},
"gr-air-modes": {
"version": "396.0b6c383-1",
"description": "Gnuradio tools for receiving Mode S transponder signals, including ADS-B.",
"dependencies": [
"gnuradio",
"gnuradio-companion",
"gnuradio-osmosdr",
"python2-numpy",
"python2-scipy",
"python2-pyzmq",
"sqlite",
"libuhd",
"python2-pyqt4",
"swig",
"boost"
]
},
"grammarinator": {
"version": "395.0402b7f-1",
"description": "A random test generator / fuzzer that creates test cases according to an input ANTLR v4 grammar.",
"dependencies": [
"python",
"autopep8",
"python-antlerinator",
"python-jinja",
"python-antlr4"
]
},
"graphinder": {
"version": "1.11.6-6",
"description": "GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-aiohttp"
]
},
"graphql-cop": {
"version": "1:1.14.r0.g6efbc2d-1",
"description": "GraphQL vulnerability scanner.",
"dependencies": [
"python",
"python-requests",
"python-simplejson"
]
},
"graphqlmap": {
"version": "63.59305d7-6",
"description": "Scripting engine to interact with a graphql endpoint for pentesting purposes.",
"dependencies": [
"python",
"python-requests",
"python-urllib3"
]
},
"graphql-path-enum": {
"version": "23.5450280-1",
"description": "Tool that lists the different ways of reaching a given type in a GraphQL schema.",
"dependencies": []
},
"graphql-path-enum-debug": {
"version": "23.5450280-1",
"description": "Detached debugging symbols for graphql-path-enum",
"dependencies": []
},
"graphw00f": {
"version": "1.1.19.r0.g52e25d3-4",
"description": "GraphQL endpoint detection and engine fingerprinting.",
"dependencies": [
"python",
"python-requests"
]
},
"graudit": {
"version": "643.f7962eb-1",
"description": "Grep rough source code auditing tool.",
"dependencies": []
},
"gr-dect2": {
"version": "35.a1074fd-2",
"description": "Real-time DECT voice channel decoding by Gnuradio.",
"dependencies": [
"gnuradio",
"gnuradio-osmosdr",
"hackrf"
]
},
"gr-dect2-debug": {
"version": "35.a1074fd-2",
"description": "Detached debugging symbols for gr-dect2",
"dependencies": []
},
"greenbone-feed-sync": {
"version": "24.9.0-4",
"description": "New script for downloading the Greenbone Community Feed.",
"dependencies": [
"rsync",
"python-rich",
"python-tomli",
"python-shtab"
]
},
"grepcidr": {
"version": "2.0-1",
"description": "Filter IPv4 and IPv6 addresses matching CIDR patterns.",
"dependencies": [
"glibc"
]
},
"grepcidr-debug": {
"version": "2.0-1",
"description": "Detached debugging symbols for grepcidr",
"dependencies": []
},
"grepforrfi": {
"version": "0.1-6",
"description": "Simple script for parsing web logs for RFIs and Webshells v1.2",
"dependencies": [
"python2"
]
},
"gr-gsm": {
"version": "1194.a77cf59-5",
"description": "Gnuradio blocks and tools for receiving GSM transmissions.",
"dependencies": [
"gnuradio",
"libosmocore",
"boost",
"swig",
"log4cpp",
"python-scipy",
"qwt",
"gnuradio-companion",
"python-docutils",
"talloc",
"pygtk",
"gnuradio-osmosdr",
"libosmosdr",
"cppunit",
"doxygen",
"lksctp-tools",
"python-pyqt5",
"gcc-libs",
"python"
]
},
"gr-gsm-debug": {
"version": "1194.a77cf59-5",
"description": "Detached debugging symbols for gr-gsm",
"dependencies": []
},
"grig": {
"version": "0.8.0-1",
"description": "Rig control (cat) program.",
"dependencies": []
},
"grokevt": {
"version": "0.5.0-1",
"description": "A collection of scripts built for reading Windows\u00ae NT/2K/XP/2K eventlog files.",
"dependencies": []
},
"gr-paint": {
"version": "50.3806b20-3",
"description": "An OFDM Spectrum Painter for GNU Radio.",
"dependencies": [
"gnuradio",
"gnuradio-companion",
"python2-pillow6"
]
},
"gr-paint-debug": {
"version": "50.3806b20-3",
"description": "Detached debugging symbols for gr-paint",
"dependencies": []
},
"grr": {
"version": "17.791ed5a-2",
"description": "High-throughput fuzzer and emulator of DECREE binaries.",
"dependencies": [
"gflags"
]
},
"grype": {
"version": "1:0.33.1-1",
"description": "A vulnerability scanner for container images and filesystems.",
"dependencies": []
},
"gsa": {
"version": "24.0.1-1",
"description": "Greenbone Security Assistant - The web frontend for the Greenbone Community Edition.",
"dependencies": [
"gsad",
"openvas-scanner"
]
},
"gsad": {
"version": "24.0.0-1",
"description": "Greenbone Security Assistant HTTP Server - The server talking to the Greenbone Vulnerability Management daemon (gvmd).",
"dependencies": [
"gvmd",
"gvm-libs",
"gnutls",
"libgcrypt",
"libmicrohttpd",
"libglib-2.0.so=0-64",
"libxml2.so=2-64",
"zlib"
]
},
"gsad-debug": {
"version": "24.0.0-1",
"description": "Detached debugging symbols for gsad",
"dependencies": []
},
"gsd": {
"version": "1.1-2",
"description": "Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option.",
"dependencies": []
},
"gsmevil2": {
"version": "12.eb96b4f-4",
"description": "Python web-based tool which use for capturing imsi numbers and sms.",
"dependencies": [
"gr-gsm",
"kalibrate-rtl",
"python-appdirs",
"python-flask",
"python-flask-socketio",
"python-pyshark",
"python-termcolor"
]
},
"gspoof": {
"version": "3.2-2",
"description": "A simple GTK/command line TCP/IP packet generator.",
"dependencies": [
"gtk2",
"glib2",
"libnet"
]
},
"gtalk-decode": {
"version": "0.1-7",
"description": "Google Talk decoder tool that demonstrates recovering passwords from accounts.",
"dependencies": []
},
"gtfo": {
"version": "17.873d862-6",
"description": "Search gtfobins and lolbas files from your terminal.",
"dependencies": [
"python",
"python-pyaml",
"python-requests",
"python-beautifulsoup4",
"python-lxml",
"python-requests-cache",
"python-tabulate",
"python-pyfiglet"
]
},
"gtfoblookup": {
"version": "69.cc50e6e-5",
"description": "Offline command line lookup utility for GTFOBins and LOLBAS.",
"dependencies": [
"python",
"python-colorama",
"python-gitpython",
"python-yaml",
"python-appdirs"
]
},
"gtksourceview2": {
"version": "2.10.5-8",
"description": "A text widget adding syntax highlighting and more to GNOME.",
"dependencies": [
"gtk2",
"libxml2"
]
},
"gtksourceview2-debug": {
"version": "2.10.5-8",
"description": "Detached debugging symbols for gtksourceview2",
"dependencies": []
},
"gtp-scan": {
"version": "0.7-5",
"description": "A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.",
"dependencies": [
"python2",
"python2-ipy"
]
},
"guymager": {
"version": "0.8.13-1",
"description": "A forensic imager for media acquisition.",
"dependencies": [
"qt5-base"
]
},
"gvmd": {
"version": "24.0.0-3",
"description": "Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition.",
"dependencies": [
"ospd-openvas",
"cjson",
"gvm-libs",
"libbsd",
"libical",
"pg-gvm",
"python",
"gnutls",
"postgresql",
"libxslt"
]
},
"gvmd-debug": {
"version": "24.0.0-3",
"description": "Detached debugging symbols for gvmd",
"dependencies": []
},
"gvm-libs": {
"version": "22.14.0-1",
"description": "Greenbone Vulnerability Management Libraries.",
"dependencies": [
"cjson",
"gnutls",
"hiredis",
"libgcrypt",
"libgio-2.0.so=0-64",
"libglib-2.0.so=0-64",
"libgpgme.so=11-64",
"libldap",
"libnet",
"libssh.so=4-64",
"libuuid.so=1-64",
"libxml2.so=2-64",
"paho-mqtt-c",
"zlib",
"libpcap"
]
},
"gvm-libs-debug": {
"version": "22.14.0-1",
"description": "Detached debugging symbols for gvm-libs",
"dependencies": []
},
"gwcheck": {
"version": "0.1-2",
"description": "A simple program that checks if a host in an ethernet network is a gateway to Internet.",
"dependencies": [
"libpcap"
]
},
"gwtenum": {
"version": "1:7.f27a5aa-7",
"description": "Enumeration of GWT-RCP method calls.",
"dependencies": [
"python2"
]
},
"h2buster": {
"version": "79.6c4dd1c-8",
"description": "A threaded, recursive, web directory brute-force scanner over HTTP/2.",
"dependencies": [
"python",
"python-hyper"
]
},
"h2csmuggler": {
"version": "7.7ea573a-8",
"description": "HTTP Request Smuggling over HTTP/2 Cleartext (h2c).",
"dependencies": [
"python",
"python-h2",
"python-urllib3"
]
},
"h2spec": {
"version": "2.6.0-1",
"description": "A conformance testing tool for HTTP/2 implementation.",
"dependencies": [
"glibc"
]
},
"h2t": {
"version": "38.56e1447-1",
"description": "Scans a website and suggests security headers to apply.",
"dependencies": [
"python",
"python-requests",
"python-colorama",
"python-idna",
"python-chardet",
"python-urllib3",
"python-certifi"
]
},
"h8mail": {
"version": "344.ee31c8f-10",
"description": "Email OSINT and password breach hunting.",
"dependencies": [
"python",
"python-requests"
]
},
"habu": {
"version": "359.8326936-6",
"description": "Python Network Hacking Toolkit.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-requests-cache",
"python-click",
"python-delegator.py",
"python-beautifulsoup4",
"python-scapy"
]
},
"hachoir-core": {
"version": "1.3.3-2",
"description": "A library written in Python which allows to see and edit a binary files field per field.",
"dependencies": [
"python2"
]
},
"hachoir-parser": {
"version": "1.3.4-2",
"description": "Most common file format parsers written using hachoir-core.",
"dependencies": [
"python2",
"hachoir-core"
]
},
"hackersh": {
"version": "0.2.0-10",
"description": "A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.",
"dependencies": [
"python2",
"pythonect",
"python2-prettytable",
"python2-netaddr",
"python2-networkx",
"python2-setuptools"
]
},
"hackredis": {
"version": "3.fbae1bc-4",
"description": "A simple tool to scan and exploit redis servers.",
"dependencies": [
"python2",
"python2-redis",
"python2-pexpect",
"python2-paramiko"
]
},
"hacktv": {
"version": "505.59aa8c0-1",
"description": "Analogue TV transmitter for the HackRF.",
"dependencies": [
"hackrf",
"ffmpeg",
"soapysdr"
]
},
"hacktv-debug": {
"version": "505.59aa8c0-1",
"description": "Detached debugging symbols for hacktv",
"dependencies": []
},
"haiti": {
"version": "v3.0.0.r1.g3b89e38-1",
"description": "Hash type identifier (CLI & lib).",
"dependencies": [
"ruby",
"ruby-paint",
"ruby-docopt"
]
},
"haka": {
"version": "0.2.2-3",
"description": "A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files.",
"dependencies": []
},
"hakku": {
"version": "384.bbb434d-6",
"description": "Simple framework that has been made for penetration testing tools.",
"dependencies": [
"python",
"python-lxml",
"python-requests",
"python-future",
"python-scapy",
"python-pyopenssl",
"python-netifaces",
"python-six",
"python-dnspython",
"python-argparse",
"python-idna",
"python-cryptography",
"python-python-whois",
"ethtool",
"aircrack-ng",
"dsniff",
"ettercap",
"xterm",
"tcpdump",
"sslstrip",
"bluez-utils"
]
},
"hakrawler": {
"version": "235.7615255-1",
"description": "Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application.",
"dependencies": []
},
"hakrawler-debug": {
"version": "235.7615255-1",
"description": "Detached debugging symbols for hakrawler",
"dependencies": []
},
"hakrevdns": {
"version": "47.3001d16-1",
"description": "Small, fast tool for performing reverse DNS lookups en masse.",
"dependencies": []
},
"hakrevdns-debug": {
"version": "47.3001d16-1",
"description": "Detached debugging symbols for hakrevdns",
"dependencies": []
},
"halberd": {
"version": "0.2.4-6",
"description": "Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.",
"dependencies": [
"python2"
]
},
"halcyon": {
"version": "0.1-3",
"description": "A repository crawler that runs checksums for static files found within a given git repository.",
"dependencies": []
},
"halcyon-ide": {
"version": "2.0.2-1",
"description": "First IDE for Nmap Script (NSE) Development.",
"dependencies": [
"java-environment",
"bash"
]
},
"hamlib": {
"version": "3.3-2",
"description": "Ham radio equipment control libraries.",
"dependencies": [
"perl",
"python2",
"tcl",
"libxml2",
"libusb"
]
},
"hamster": {
"version": "2.0.0-15",
"description": "Tool for HTTP session sidejacking.",
"dependencies": []
},
"handle": {
"version": "1:0.1-4",
"description": "An small application designed to analyze your system searching for global objects related to running process and display information for every found object, like tokens, semaphores, ports, files,..",
"dependencies": []
},
"harness": {
"version": "19.ed2a6aa-6",
"description": "Interactive remote PowerShell Payload.",
"dependencies": [
"python"
]
},
"harpoon": {
"version": "385.3de9058-4",
"description": "CLI tool for open source and threat intelligence.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"hasere": {
"version": "1.0-1",
"description": "Discover the vhosts using google and bing.",
"dependencies": []
},
"hash-buster": {
"version": "50.befb02a-4",
"description": "A python script which scraps online hash crackers to find cleartext of a hash.",
"dependencies": [
"python",
"python-requests"
]
},
"hashcatch": {
"version": "52.8145660-1",
"description": "Capture handshakes of nearby WiFi networks automatically.",
"dependencies": [
"bash",
"aircrack-ng",
"hashcat-utils",
"hcxtools",
"jq"
]
},
"hashcheck": {
"version": "2.72b0c6e-7",
"description": "Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method.",
"dependencies": [
"python",
"python-requests"
]
},
"hashdb": {
"version": "1089.1da1b9f-2",
"description": "A block hash toolkit.",
"dependencies": [
"tre",
"libxml2",
"python2",
"openssl",
"libewf",
"libtool"
]
},
"hashdb-debug": {
"version": "1089.1da1b9f-2",
"description": "Detached debugging symbols for hashdb",
"dependencies": []
},
"hashdeep": {
"version": "4.4-9",
"description": "Cross-platform tools to message digests for any number of files.",
"dependencies": [
"gcc-libs"
]
},
"hashdeep-debug": {
"version": "4.4-9",
"description": "Detached debugging symbols for hashdeep",
"dependencies": []
},
"hasher": {
"version": "48.40173c5-6",
"description": "A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.",
"dependencies": [
"python2",
"python2-passlib",
"python2-bcrypt"
]
},
"hash-extender": {
"version": "161.f00b1a0-1",
"description": "A hash length extension attack tool.",
"dependencies": [
"openssl"
]
},
"hash-extender-debug": {
"version": "161.f00b1a0-1",
"description": "Detached debugging symbols for hash-extender",
"dependencies": []
},
"hashfind": {
"version": "8.e9a9a14-4",
"description": "A tool to search files for matching password hash types and other interesting data.",
"dependencies": [
"python2"
]
},
"hashid": {
"version": "1:397.7e8473a-6",
"description": "Software to identify the different types of hashes used to encrypt data.",
"dependencies": [
"python"
]
},
"hash-identifier": {
"version": "6.0e08a97-5",
"description": "Software to identify the different types of hashes used to encrypt data and especially passwords.",
"dependencies": [
"python"
]
},
"hashpump": {
"version": "49.314268e-1",
"description": "A tool to exploit the hash length extension attack in various hashing algorithms.",
"dependencies": [
"openssl"
]
},
"hashrat": {
"version": "1.15-1",
"description": "Hashing tool supporting MD5, SHA1, SHA256, SHA512, Whirlpool, JH and their HMAC.",
"dependencies": []
},
"hashrat-debug": {
"version": "1.15-1",
"description": "Detached debugging symbols for hashrat",
"dependencies": []
},
"hashtag": {
"version": "0.41-9",
"description": "A python script written to parse and identify password hashes.",
"dependencies": [
"python2"
]
},
"haskell-iconv": {
"version": "0.4.1.3-1",
"description": "Provides an interface to the POSIX iconv library functions for string encoding conversion.",
"dependencies": []
},
"haskell-line2pdf": {
"version": "0.0.7-3",
"description": "Simple command-line utility to convert text into PDF",
"dependencies": []
},
"haskell-openafp": {
"version": "1.3.2-3",
"description": "IBM AFP document format parser and generator",
"dependencies": []
},
"haskell-openafp-utils": {
"version": "1.3.1.2-3",
"description": "Assorted utilities to work with AFP data streams",
"dependencies": []
},
"hatcloud": {
"version": "33.3012ad6-6",
"description": "Bypass CloudFlare with Ruby.",
"dependencies": [
"ruby"
]
},
"hate-crack": {
"version": "223.58c7ec8-1",
"description": "A tool for automating cracking methodologies through Hashcat.",
"dependencies": [
"python",
"pygtk",
"python-pyenchant",
"hashcat"
]
},
"hate-crack-debug": {
"version": "223.58c7ec8-1",
"description": "Detached debugging symbols for hate-crack",
"dependencies": []
},
"havoc-c2": {
"version": "856.fb67b76-1",
"description": "Modern and malleable post-exploitation command and control framework.",
"dependencies": [
"bzip2",
"fontconfig",
"gdbm",
"glu",
"gtest",
"libffi",
"mesa",
"spdlog",
"mingw-w64-gcc",
"nasm",
"ncurses",
"openssl",
"python",
"qt5-base",
"sqlite",
"qt5-websockets",
"readline"
]
},
"havoc-c2-debug": {
"version": "856.fb67b76-1",
"description": "Detached debugging symbols for havoc-c2",
"dependencies": []
},
"haystack": {
"version": "1823.c178b5a-1",
"description": "A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.",
"dependencies": [
"python2",
"python2-levenshtein",
"python2-ptrace",
"python2-networkx"
]
},
"hbad": {
"version": "1.0-2",
"description": "This tool allows you to test clients on the heartbleed bug.",
"dependencies": []
},
"hcraft": {
"version": "1.0.0-3",
"description": "HTTP Vuln Request Crafter",
"dependencies": []
},
"hdcp-genkey": {
"version": "18.e8d342d-7",
"description": "Generate HDCP source and sink keys from the leaked master key.",
"dependencies": [
"python2",
"python2-simplejson"
]
},
"hdmi-sniff": {
"version": "5.f7fbc0e-5",
"description": "HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.",
"dependencies": [
"python2",
"python2-pyserial",
"hdcp-genkey"
]
},
"heaptrace": {
"version": "2.2.8.2.r20.g06f43fc-2",
"description": "Helps visualize heap operations for pwn and debugging.",
"dependencies": [
"glibc"
]
},
"heaptrace-debug": {
"version": "2.2.8.2.r20.g06f43fc-2",
"description": "Detached debugging symbols for heaptrace",
"dependencies": []
},
"heartbleed-honeypot": {
"version": "0.1-6",
"description": "Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's",
"dependencies": [
"perl"
]
},
"heartleech": {
"version": "116.3ab1d60-1",
"description": "Scans for systems vulnerable to the heartbleed bug, and then download them.",
"dependencies": [
"glibc",
"openssl"
]
},
"hekatomb": {
"version": "107.bdd53cf-4",
"description": "Extract and decrypt all credentials from all domain computers using DPAPI.",
"dependencies": [
"python",
"impacket",
"python-dnspython",
"python-pycryptodomex",
"python-ldap3",
"python-chardet"
]
},
"hellraiser": {
"version": "279.bea43e2-3",
"description": "Vulnerability Scanner.",
"dependencies": [
"ruby2.7",
"ruby-bundler",
"ruby-pkg-config",
"libxslt",
"redis",
"nmap",
"ruby-foreman",
"ruby-rake",
"nodejs"
]
},
"hemingway": {
"version": "8.9c70a13-4",
"description": "A simple and easy to use spear phishing helper.",
"dependencies": [
"python2"
]
},
"hercules-payload": {
"version": "222.2607a3a-1",
"description": "A special payload generator that can bypass all antivirus software.",
"dependencies": []
},
"hetty": {
"version": "1:v0.7.0.r7.gf7def87-1",
"description": "HTTP toolkit for security research. Aims to become an open source alternative to commercial software like Burp Suite Pro.",
"dependencies": []
},
"hetty-debug": {
"version": "1:v0.7.0.r7.gf7def87-1",
"description": "Detached debugging symbols for hetty",
"dependencies": []
},
"hex2bin": {
"version": "2.5-2",
"description": "Converts Motorola and Intel hex files to binary.",
"dependencies": [
"glibc"
]
},
"hexhttp": {
"version": "v1.7.4.r1.g0f01774-2",
"description": "Perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors.",
"dependencies": [
"python",
"python-requests",
"wafw00f",
"python-urllib3",
"python-notify_py"
]
},
"hexinject": {
"version": "1.6-1",
"description": "A very versatile packet injector and sniffer that provides a command-line framework for raw network access.",
"dependencies": [
"libpcap"
]
},
"hexorbase": {
"version": "2:6-1",
"description": "A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).",
"dependencies": []
},
"hharp": {
"version": "1beta-7",
"description": "This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"hidattack": {
"version": "0.1-5",
"description": "HID Attack (attacking HID host implementations)",
"dependencies": []
},
"hiddeneye": {
"version": "1228.7a3deaf-3",
"description": "Modern phishing tool with advanced functionality.",
"dependencies": [
"python",
"python-requests",
"python-pyngrok",
"python-future",
"python-yaml",
"php",
"python-pgrep"
]
},
"hiddeneye-legacy": {
"version": "RC1.r226.g7a3deaf-2",
"description": "Modern Phishing Tool With Advanced Functionality.",
"dependencies": [
"python",
"python-certifi",
"python-chardet",
"python-future",
"python-idna",
"python-pyngrok",
"python-yaml",
"python-requests",
"python-urllib3",
"python-pgrep",
"python-kill"
]
},
"hikpwn": {
"version": "8.5a7d69c-7",
"description": "A simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8.",
"dependencies": [
"python",
"python-scapy",
"python-lxml",
"python-requests"
]
},
"hlextend": {
"version": "17.be21920-3",
"description": "Pure Python hash length extension module.",
"dependencies": [
"python2"
]
},
"hodor": {
"version": "1.01be107-5",
"description": "A general-use fuzzer that can be configured to use known-good input and delimiters in order to fuzz specific locations.",
"dependencies": [
"python2"
]
},
"holehe": {
"version": "434.14da70f-4",
"description": "A tool for Efficiently finding registered accounts from emails.",
"dependencies": [
"python",
"python-termcolor",
"python-beautifulsoup4",
"python-httpx",
"python-trio",
"python-tqdm",
"python-colorama"
]
},
"hollows-hunter": {
"version": "0.4.0-1",
"description": "Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).",
"dependencies": []
},
"homepwn": {
"version": "31.0803981-7",
"description": "Swiss Army Knife for Pentesting of IoT Devices.",
"dependencies": [
"python",
"python-prompt_toolkit",
"wireshark-cli",
"screen",
"hostapd",
"dnsmasq",
"libxml2",
"cups",
"nmap",
"tcpdump",
"bluez",
"bluez-tools",
"pcsc-tools",
"glib2",
"python-dbus",
"wondershaper",
"libpcap"
]
},
"homepwn-debug": {
"version": "31.0803981-7",
"description": "Detached debugging symbols for homepwn",
"dependencies": []
},
"honeycreds": {
"version": "26.eaeb401-7",
"description": "Network credential injection to detect responder and other network poisoners.",
"dependencies": [
"python",
"python-smbprotocol",
"python-cffi",
"python-splunk-sdk"
]
},
"honeyd": {
"version": "337.a0f3d64-2",
"description": "A small daemon that creates virtual hosts on a network.",
"dependencies": [
"libdnet",
"libevent",
"libedit",
"libpcap",
"pcre",
"zlib",
"tcl",
"python2"
]
},
"honeypy": {
"version": "600.6ca3d6e-3",
"description": "A low interaction Honeypot.",
"dependencies": [
"python2",
"python2-dnslib",
"python2-requests",
"python2-twistedx",
"python2-certifi",
"python2-urllib3"
]
},
"honggfuzz": {
"version": "4114.974db6a9-1",
"description": "A general-purpose fuzzer with simple, command-line interface.",
"dependencies": [
"binutils",
"libunwind"
]
},
"honggfuzz-debug": {
"version": "4114.974db6a9-1",
"description": "Detached debugging symbols for honggfuzz",
"dependencies": []
},
"honssh": {
"version": "204.821ce87-3",
"description": "A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.",
"dependencies": [
"python2"
]
},
"hookanalyser": {
"version": "3.4-1",
"description": "A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.",
"dependencies": []
},
"hookshot": {
"version": "205.df30b85-4",
"description": "Integrated web scraper and email account data breach comparison tool.",
"dependencies": [
"python",
"python-requests"
]
},
"hoover": {
"version": "4.9bda860-7",
"description": "Wireless Probe Requests Sniffer.",
"dependencies": [
"perl",
"perl-getopt-long",
"wireless_tools",
"wireshark-cli",
"net-tools"
]
},
"hoper": {
"version": "15.8d5dbd9-3",
"description": "Trace URL's jumps across the rel links to obtain the last URL.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"hopper": {
"version": "5.17.4-1",
"description": "Reverse engineering tool that lets you disassemble, decompile and debug your applications.",
"dependencies": [
"hicolor-icon-theme",
"libbsd",
"python2",
"qt5-base"
]
},
"hopper-debug": {
"version": "5.17.4-1",
"description": "Detached debugging symbols for hopper",
"dependencies": []
},
"hoppy": {
"version": "1.8.1-4",
"description": "A python script which tests http methods for configuration issues leaking information or just to see if they are enabled.",
"dependencies": [
"python2",
"python2-pyopenssl"
]
},
"horusec-debug": {
"version": "v2.9.0.beta.2.r1.g873d4104-1",
"description": "Detached debugging symbols for horusec",
"dependencies": []
},
"horusec": {
"version": "v2.9.0.beta.2.r1.g873d4104-1",
"description": "Static code analysis to identify security flaws for many languages.",
"dependencies": []
},
"hostapd-wpe": {
"version": "2.11-1",
"description": "Modified hostapd to facilitate AP impersonation attacks.",
"dependencies": [
"glibc",
"libnl",
"openssl-1.0",
"sqlite"
]
},
"hostapd-wpe-debug": {
"version": "2.11-1",
"description": "Detached debugging symbols for hostapd-wpe",
"dependencies": []
},
"hostbox-ssh": {
"version": "0.1.1-6",
"description": "A ssh password/account scanner.",
"dependencies": [
"python2",
"python2-paramiko",
"wxpython"
]
},
"host-extract": {
"version": "1:8.0134ad7-16",
"description": "Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.",
"dependencies": [
"ruby",
"ruby-mechanize",
"ruby-net-http-digest_auth",
"rubygems",
"ruby-http-cookie",
"ruby-ntlm-http",
"ruby-webrobots",
"ruby-rubyntlm",
"ruby-webrick"
]
},
"hosthunter": {
"version": "158.553f1c7-6",
"description": "A recon tool for discovering hostnames using OSINT techniques.",
"dependencies": [
"python",
"python-requests",
"python-selenium",
"python-urllib3",
"python-pyopenssl",
"python-fake-useragent",
"python-validator-collection"
]
},
"hotpatch": {
"version": "90.fd2baf1-1",
"description": "Hot patches executables on Linux using .so file injection.",
"dependencies": []
},
"hotspotter": {
"version": "0.4-2",
"description": "Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.",
"dependencies": []
},
"howmanypeoplearearound": {
"version": "123.b05e06a-8",
"description": "Count the number of people around you by monitoring wifi signals.",
"dependencies": [
"python",
"python-pick",
"python-netifaces",
"python-click",
"wireshark-cli"
]
},
"hpfeeds": {
"version": "414.34bf4d4-4",
"description": "Honeynet Project generic authenticated datafeed protocol.",
"dependencies": [
"python",
"python-aiohttp",
"python-attrs",
"python-async-timeout",
"python-chardet",
"python-idna",
"python-multidict",
"python-yarl",
"python-prometheus_client",
"python-wrapt",
"python-aiorun",
"python-idna_ssl"
]
},
"hqlmap": {
"version": "38.bb6ab46-6",
"description": "A tool to exploit HQL Injections.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-beautifulsoup4",
"python2-requests"
]
},
"hsecscan": {
"version": "67.aa5845b-1",
"description": "A security scanner for HTTP response headers.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-pysqlite",
"python2-setuptools"
]
},
"htcap": {
"version": "1:155.a59c592-8",
"description": "A web application analysis tool for detecting communications between javascript and the server.",
"dependencies": [
"python",
"python-simplejson",
"phantomjs"
]
},
"htexploit": {
"version": "0.77-5",
"description": "A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process",
"dependencies": []
},
"htpwdscan": {
"version": "23.e995d6f-7",
"description": "A python HTTP weak pass scanner.",
"dependencies": [
"python",
"python-colorama",
"python-urllib3",
"python-requests-ntlm"
]
},
"htrosbif": {
"version": "134.9dc3f86-4",
"description": "Active HTTP server fingerprinting and recon tool.",
"dependencies": []
},
"htshells": {
"version": "2:89.3216523-1",
"description": "Self contained web shells and other attacks via .htaccess files.",
"dependencies": []
},
"http2smugl": {
"version": "36.78abc09-1",
"description": "Http2Smugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion.",
"dependencies": [
"glibc"
]
},
"httpbog": {
"version": "1.0.0.0-5",
"description": "A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.",
"dependencies": []
},
"http-enum": {
"version": "0.4-4",
"description": "A tool to enumerate the enabled HTTP methods supported on a webserver.",
"dependencies": [
"python2"
]
},
"httpforge": {
"version": "11.02.01-6",
"description": "A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.",
"dependencies": [
"python2"
]
},
"http-fuzz": {
"version": "1:0.1-4",
"description": "A simple http fuzzer.",
"dependencies": [
"perl"
]
},
"httpgrep": {
"version": "2.4-4",
"description": "A python tool which scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.",
"dependencies": [
"python",
"python-requests"
]
},
"http-put": {
"version": "1.0-2",
"description": "Simple http put perl script.",
"dependencies": [
"perl",
"perl-net-ssleay"
]
},
"httppwnly": {
"version": "47.528a664-5",
"description": "\"Repeater\" style XSS post-exploitation tool for mass browser control.",
"dependencies": [
"python2",
"python2-flask",
"python2-pysqlite",
"python2-flask-sqlalchemy",
"python2-flask-cors",
"python2-flask-bcrypt",
"python2-flask-socketio",
"python2-python-socketio",
"python2-flask-login"
]
},
"httprecon": {
"version": "7.3-3",
"description": "Tool for web server fingerprinting, also known as http fingerprinting.",
"dependencies": []
},
"httprint": {
"version": "301-5",
"description": "A web server fingerprinting tool.",
"dependencies": []
},
"httprint-win32": {
"version": "301-5",
"description": "A web server fingerprinting tool (Windows binaries).",
"dependencies": []
},
"httprobe": {
"version": "22.5555984-2",
"description": "Take a list of domains and probe for working HTTP and HTTPS servers",
"dependencies": []
},
"httpry": {
"version": "0.1.8-4",
"description": "A specialized packet sniffer designed for displaying and logging HTTP traffic.",
"dependencies": [
"libpcap"
]
},
"httpry-debug": {
"version": "0.1.8-4",
"description": "Detached debugging symbols for httpry",
"dependencies": []
},
"httpscreenshot": {
"version": "70.f081c69-4",
"description": "A tool for grabbing screenshots and HTML of large numbers of websites.",
"dependencies": [
"python",
"python-selenium",
"python-pillow6",
"python-python-libnmap",
"python-m2crypto",
"python-requests",
"python-beautifulsoup4",
"python-pyvirtualdisplay",
"python-lxml",
"python-webdriver-manager"
]
},
"httpsniff": {
"version": "0.4-2",
"description": "Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.",
"dependencies": []
},
"httpsscanner": {
"version": "1.2-1",
"description": "A tool to test the strength of a SSL web server.",
"dependencies": []
},
"http-traceroute": {
"version": "0.5-5",
"description": "This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.",
"dependencies": [
"python2"
]
},
"httpx": {
"version": "2399.81ce4b1-1",
"description": "A fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library.",
"dependencies": []
},
"httpx-debug": {
"version": "2399.81ce4b1-1",
"description": "Detached debugging symbols for httpx",
"dependencies": []
},
"hubbit-sniffer": {
"version": "74.460ecf8-3",
"description": "Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api.",
"dependencies": [
"python",
"python-requests"
]
},
"hulk": {
"version": "27.ed2b11c-2",
"description": "A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.",
"dependencies": []
},
"hungry-interceptor": {
"version": "391.1aea7f3-5",
"description": "Intercepts data, does something with it, stores it.",
"dependencies": [
"python2",
"python2-flask-wtf",
"python2-flask-cors",
"python2-pymongo",
"python2-flask-pymongo",
"python2-py2neo"
]
},
"hurl-encoder": {
"version": "20.afca9c5-5",
"description": "Hexadecimal & URL (en/de)coder.",
"dependencies": [
"perl",
"perl-cgi",
"perl-uri",
"perl-digest-sha1",
"perl-mime-types"
]
},
"hwk": {
"version": "0.4-4",
"description": "Collection of packet crafting and wireless network flooding tools",
"dependencies": []
},
"hxd": {
"version": "2.5.0.0-2",
"description": "Freeware Hex Editor and Disk Editor.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"hyde": {
"version": "11.ec09462-1",
"description": "Just another tool in C to do DDoS (with spoofing).",
"dependencies": []
},
"hyenae": {
"version": "0.36_1-3",
"description": "Flexible platform independent packet generator.",
"dependencies": [
"libpcap",
"libdnet"
]
},
"hyperfox": {
"version": "121.1a8c26f-2",
"description": "A security tool for proxying and recording HTTP and HTTPs traffic.",
"dependencies": [
"sqlite"
]
},
"hyperion-crypter": {
"version": "2.3.1-1",
"description": "A runtime encrypter for 32-bit and 64-bit portable executables.",
"dependencies": []
},
"iaxflood": {
"version": "3:0.1-2",
"description": "IAX flooder.",
"dependencies": []
},
"iaxscan": {
"version": "0.02-2",
"description": "A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.",
"dependencies": [
"python2"
]
},
"ibrute": {
"version": "12.3a6a11e-4",
"description": "An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-lxml"
]
},
"icloudbrutter": {
"version": "15.1f64f19-2",
"description": "Tool for AppleID Bruteforce.",
"dependencies": [
"python",
"python-requests",
"python-urllib3"
]
},
"icmpquery": {
"version": "1.0-4",
"description": "Send and receive ICMP queries for address mask and current time.",
"dependencies": []
},
"icmpsh": {
"version": "12.82caf34-5",
"description": "Simple reverse ICMP shell.",
"dependencies": [
"python2",
"perl"
]
},
"icmpsh-debug": {
"version": "12.82caf34-5",
"description": "Detached debugging symbols for icmpsh",
"dependencies": []
},
"icmptx": {
"version": "1:0.2.r12.g2235866-1",
"description": "IP over ICMP tunnel.",
"dependencies": [
"glibc"
]
},
"icmptx-debug": {
"version": "1:0.2.r12.g2235866-1",
"description": "Detached debugging symbols for icmptx",
"dependencies": []
},
"ida-free": {
"version": "8.4.240527-1",
"description": "Freeware version of the world's smartest and most feature-full disassembler.",
"dependencies": []
},
"idb": {
"version": "2.10.3-14",
"description": "A tool to simplify some common tasks for iOS pentesting and research.",
"dependencies": [
"ruby",
"qt4"
]
},
"id-entify": {
"version": "34.dd064a5-5",
"description": "Search for information related to a domain: Emails - IP addresses - Domains - Information on WEB technology - Type of Firewall - NS and MX records.",
"dependencies": [
"python2",
"python2-colorama",
"dnsrecon",
"dnsenum",
"bind-tools",
"whatweb",
"nmap",
"whois",
"bash",
"wafw00f",
"tmux",
"theharvester",
"fierce"
]
},
"identywaf": {
"version": "207.ae7e44a-3",
"description": "Blind WAF identification tool.",
"dependencies": [
"python"
]
},
"idswakeup": {
"version": "1.0-2",
"description": "A collection of tools that allows to test network intrusion detection systems.",
"dependencies": []
},
"ifchk": {
"version": "1.1.2-1",
"description": "A network interface promiscuous mode detection tool.",
"dependencies": [
"sysfsutils"
]
},
"ifuzz": {
"version": "1.0-1",
"description": "A binary file fuzzer with several options.",
"dependencies": []
},
"iheartxor": {
"version": "0.01-7",
"description": "A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.",
"dependencies": [
"python2"
]
},
"iisbruteforcer": {
"version": "15-1",
"description": "HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server.",
"dependencies": []
},
"iis-shortname-scanner": {
"version": "5.4ad4937-2",
"description": "An IIS shortname Scanner.",
"dependencies": [
"python2"
]
},
"ikecrack": {
"version": "1.00-10",
"description": "An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication",
"dependencies": [
"perl",
"perl-digest-hmac"
]
},
"ikeforce": {
"version": "30.575af15-4",
"description": "A command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.",
"dependencies": [
"python2",
"python2-pyopenssl",
"python2-pycryptodome",
"python2-pycryptodomex",
"python2-pyip"
]
},
"ikeprobe": {
"version": "2:0.1-6",
"description": "Determine vulnerabilities in the PSK implementation of the VPN server.",
"dependencies": []
},
"ikeprober": {
"version": "1.12-7",
"description": "Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors",
"dependencies": [
"perl"
]
},
"ike-scan": {
"version": "1.9.5-3",
"description": "A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers.",
"dependencies": [
"openssl"
]
},
"ike-scan-debug": {
"version": "1.9.5-3",
"description": "Detached debugging symbols for ike-scan",
"dependencies": []
},
"ilo4-toolbox": {
"version": "47.672a5d6-4",
"description": "Toolbox for HPE iLO4 analysis.",
"dependencies": [
"python2",
"python2-requests",
"python2-keystone",
"python2-capstone",
"ruby",
"go"
]
},
"ilo4-toolbox-debug": {
"version": "47.672a5d6-4",
"description": "Detached debugging symbols for ilo4-toolbox",
"dependencies": []
},
"ilty": {
"version": "1.0-7",
"description": "An interception phone system for VoIP network.",
"dependencies": [
"python2",
"python2-pylibpcap",
"sox",
"python2-pypcap"
]
},
"imagegrep": {
"version": "8.1f14af2-1",
"description": "Grep word in pdf or image based on OCR.",
"dependencies": [
"bash",
"tesseract",
"imagemagick"
]
},
"imagejs": {
"version": "56.a442f94-3",
"description": "Small tool to package javascript into a valid image file.",
"dependencies": [
"python2"
]
},
"imagejs-debug": {
"version": "56.a442f94-3",
"description": "Detached debugging symbols for imagejs",
"dependencies": []
},
"imagemounter": {
"version": "413.383b30b-6",
"description": "Command line utility and Python package to ease the (un)mounting of forensic disk images.",
"dependencies": [
"python",
"python-termcolor",
"python-argparse"
]
},
"imhex": {
"version": "1.37.0.r43.g8c13d0096-1",
"description": "A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.",
"dependencies": [
"glfw",
"glm",
"capstone",
"llvm-libs",
"llvm",
"nlohmann-json",
"python",
"file",
"gtk3",
"mbedtls",
"libssh2",
"curl",
"dbus",
"freetype2",
"yara",
"hicolor-icon-theme",
"xdg-desktop-portal-gtk",
"fmt"
]
},
"imhex-debug": {
"version": "1.37.0.r43.g8c13d0096-1",
"description": "Detached debugging symbols for imhex",
"dependencies": []
},
"impacket-ba": {
"version": "0.12.0-4",
"description": "Collection of classes for working with network protocols.",
"dependencies": [
"python",
"python-pyasn1",
"python-pyasn1-modules",
"python-pycryptodomex",
"python-pyopenssl",
"python-six",
"python-ldap3",
"ldapdomaindump",
"python-flask",
"python-setuptools",
"python-charset-normalizer"
]
},
"impulse": {
"version": "77.6939ea2-8",
"description": "Modern Denial-of-service ToolKit.",
"dependencies": [
"python",
"python-requests",
"python-phonenumbers",
"python-wget",
"scapy",
"python-colorama"
]
},
"inception": {
"version": "454.4df3231-5",
"description": "A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA.",
"dependencies": [
"python",
"libforensic1394",
"python-libforensic1394",
"python-pyusb"
]
},
"indx2csv": {
"version": "17.129a411e-1",
"description": "An advanced parser for INDX records.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"indxcarver": {
"version": "5.dee36608-1",
"description": "Carve INDX records from a chunk of data.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"indxparse": {
"version": "198.a977192-1",
"description": "A Tool suite for inspecting NTFS artifacts.",
"dependencies": [
"python2",
"python2-progressbar"
]
},
"inetsim": {
"version": "1.3.2-4",
"description": "A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.",
"dependencies": [
"perl",
"perl-net-server",
"perl-ipc-shareable",
"openssl",
"perl-net-dns"
]
},
"infection-monkey": {
"version": "v2.2.0.r3597.g0f8952dff-2",
"description": "Automated security testing tool for networks.",
"dependencies": [
"python",
"python-cryptography",
"python-cffi",
"python-ecdsa",
"aws-cli",
"pyinstaller",
"impacket",
"python-netifaces",
"python-odict",
"python-paramiko",
"python-psutil",
"python-pycryptodome",
"python-semver",
"python-pyftpdlib",
"pymssql",
"python-pypykatz",
"python-pysmb",
"python-requests",
"python-urllib3",
"python-simplejson",
"python-pypsrp",
"python-flask-pymongo",
"python-flask-restful",
"python-boto3",
"python-botocore",
"python-pyjwt",
"python-flask",
"python-gevent",
"python-jsonschema",
"python-mongoengine",
"python-mongomock",
"python-pytest",
"python-dateutil",
"python-requests-mock",
"python-ring",
"python-stix2",
"python-six",
"python-tqdm",
"python-virtualenv",
"python-werkzeug",
"python-wheel",
"python-flask-jwt-extended",
"python-dpath",
"python-stix2-patterns",
"python-ldaptor",
"python-pypubsub",
"python-marshmallow",
"python-marshmallow-enum",
"python-pymssql",
"python-pyspnego",
"python-serpentarium",
"python-egg-timer"
]
},
"infip": {
"version": "0.1-7",
"description": "A python script that checks output from netstat against RBLs from Spamhaus.",
"dependencies": [
"python2",
"python2-httplib2",
"python2-beautifulsoup3"
]
},
"infoga": {
"version": "3:33.79a1c03-3",
"description": "Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers).",
"dependencies": [
"python",
"python-requests",
"python-urllib3",
"python-colorama"
]
},
"inguma": {
"version": "0.1.1-8",
"description": "A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.",
"dependencies": [
"python2",
"python2-paramiko",
"python2-pyqt"
]
},
"injectus": {
"version": "12.3c01fa0-7",
"description": "CRLF and open redirect fuzzer.",
"dependencies": [
"python",
"python-aiohttp",
"python-aiodns",
"python-aiofiles"
]
},
"innounp": {
"version": "0.50-1",
"description": "Inno Setup Unpacker.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"inquisitor": {
"version": "1:28.12a9ec1-11",
"description": "OSINT Gathering Tool for Companies and Organizations.",
"dependencies": [
"python2",
"python2-argparse",
"python2-netaddr",
"python2-python-whois",
"python2-unidecode",
"python2-tld",
"python2-validate-email",
"python2-unqlite",
"python2-google-api-python-client",
"python2-shodan",
"python2-tabulate",
"python2-ipwhois"
]
},
"insanity": {
"version": "117.cf51ff3-1",
"description": "Generate Payloads and Control Remote Machines .",
"dependencies": [
"python2",
"wget",
"wine"
]
},
"instagramosint": {
"version": "21.30b5735-4",
"description": "An Instagram Open Source Intelligence Tool.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests"
]
},
"instashell": {
"version": "1:44.8f867bd-1",
"description": "Multi-threaded Instagram Brute Forcer without password limit.",
"dependencies": [
"curl",
"tor",
"openssl"
]
},
"intelmq": {
"version": "3.3.1.r65.gadb2d156d-1",
"description": "A tool for collecting and processing security feeds using a message queuing protocol.",
"dependencies": [
"python",
"python-dnspython",
"python-psutil",
"python-dateutil",
"python-termstyle",
"python-pytz",
"python-redis",
"python-requests",
"python-ruamel-yaml",
"python-psycopg2"
]
},
"intelplot": {
"version": "12.4dd9fc0-1",
"description": "OSINT Tool to Mark Points on Offline Map.",
"dependencies": [
"php"
]
},
"intensio-obfuscator": {
"version": "280.f66a22b-8",
"description": "Obfuscate a python code 2 and 3.",
"dependencies": [
"python",
"python-tqdm",
"python-colorama",
"python-progress"
]
},
"interactsh-client-debug": {
"version": "v1.2.3.r0.g99c752e-1",
"description": "Detached debugging symbols for interactsh-client",
"dependencies": []
},
"interactsh-client": {
"version": "v1.2.3.r0.g99c752e-1",
"description": "Open-Source Solution for Out of band Data Extraction.",
"dependencies": [
"glibc"
]
},
"intercepter-ng": {
"version": "1.0-4",
"description": "A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.",
"dependencies": []
},
"interlace": {
"version": "354.79b8949-5",
"description": "Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.",
"dependencies": [
"python",
"python-colorclass",
"python-netaddr",
"python-tqdm"
]
},
"interrogate": {
"version": "5.eb5f071-1",
"description": "A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.",
"dependencies": []
},
"intersect": {
"version": "2.5-5",
"description": "Post-exploitation framework.",
"dependencies": [
"python"
]
},
"intrace": {
"version": "1.5-4",
"description": "Traceroute-like application piggybacking on existing TCP connections",
"dependencies": []
},
"inundator": {
"version": "0.5-5",
"description": "An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.",
"dependencies": [
"nmap",
"perl",
"perl-net-cidr",
"perl-net-socks"
]
},
"inurlbr": {
"version": "34.dbf9773-1",
"description": "Advanced search in the search engines - Inurl scanner, dorker, exploiter.",
"dependencies": [
"php"
]
},
"inviteflood": {
"version": "2.0-4",
"description": "Flood a device with INVITE requests",
"dependencies": [
"libnet"
]
},
"invoke-cradlecrafter": {
"version": "19.3ff8bac-1",
"description": "PowerShell Remote Download Cradle Generator & Obfuscator.",
"dependencies": []
},
"invoke-dosfuscation": {
"version": "7.6260f5b-1",
"description": "Cmd.exe Command Obfuscation Generator & Detection Test Harness.",
"dependencies": []
},
"invoke-obfuscation": {
"version": "45.f20e7f8-1",
"description": "PowerShell Obfuscator.",
"dependencies": []
},
"inzider": {
"version": "1.2-2",
"description": "This is a tool that lists processes in your Windows system and the ports each one listen on.",
"dependencies": []
},
"iosforensic": {
"version": "1.0-5",
"description": "iOS forensic tool.",
"dependencies": [
"python2",
"sshpass",
"sqlite3",
"python2-magic",
"libplist",
"openssh"
]
},
"ip2clue": {
"version": "0.0.95-1",
"description": "A small memory/CPU footprint daemon to lookup country (and other info) based on IP (v4 and v6).",
"dependencies": [
"bash",
"conn"
]
},
"ipaudit": {
"version": "1.1-2",
"description": "Monitors network activity on a network.",
"dependencies": [
"libpcap"
]
},
"ipba2": {
"version": "1:95.c03bd85-4",
"description": "IOS Backup Analyzer.",
"dependencies": [
"python2",
"python2-pillow6",
"python2-pyside",
"python2-six",
"qt4"
]
},
"ipcountry": {
"version": "1.2-10",
"description": "Fetches IPv4 ranges of given country in host and cidr format.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests"
]
},
"ipdecap": {
"version": "96.45d2a7d-2",
"description": "Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.",
"dependencies": [
"openssl",
"libpcap"
]
},
"ipdecap-debug": {
"version": "96.45d2a7d-2",
"description": "Detached debugging symbols for ipdecap",
"dependencies": []
},
"iphoneanalyzer": {
"version": "2.1.0-1",
"description": "Allows you to forensically examine or recover date from in iOS device.",
"dependencies": []
},
"ip-https-tools": {
"version": "7.170691f-4",
"description": "Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.",
"dependencies": [
"python2"
]
},
"ipmipwn": {
"version": "6.74a08a8-4",
"description": "IPMI cipher 0 attack tool.",
"dependencies": [
"python2",
"ipmitool",
"nmap"
]
},
"ipobfuscator": {
"version": "27.f005262-1",
"description": "A simple tool to convert the IP to a DWORD IP.",
"dependencies": []
},
"ipscan": {
"version": "3.9.1-1",
"description": "A very fast IP address and port scanner.",
"dependencies": [
"java-environment"
]
},
"ipsourcebypass": {
"version": "1.2.r16.gdc9f70c-1",
"description": "This Python script can be used to bypass IP source restrictions using HTTP headers.",
"dependencies": [
"python",
"python-requests",
"python-rich"
]
},
"iptodomain": {
"version": "18.f1afcd7-3",
"description": "This tool extract domains from IP address based in the information saved in virustotal.",
"dependencies": [
"python2"
]
},
"ip-tracer": {
"version": "92.6b9c454-1",
"description": "Track and retrieve any ip address information.",
"dependencies": [
"bash",
"php"
]
},
"iptv": {
"version": "138.ae6457b-3",
"description": "Search and brute force illegal iptv server.",
"dependencies": [
"python2",
"python2-google",
"python2-psutil",
"python2-clint",
"python2-colored",
"python2-pyprind",
"python2-pyqt4"
]
},
"ipv4bypass": {
"version": "24.f54072b-4",
"description": "Using IPv6 to Bypass Security.",
"dependencies": [
"python2",
"python2-termcolor",
"python2-python-nmap",
"nmap",
"arp-scan"
]
},
"ipv666": {
"version": "182.ad45ae8-2",
"description": "Golang IPv6 address enumeration.",
"dependencies": []
},
"ipv6toolkit": {
"version": "861.9ee80b6-1",
"description": "SI6 Networks' IPv6 Toolkit.",
"dependencies": [
"libpcap",
"perl"
]
},
"ipv6toolkit-debug": {
"version": "861.9ee80b6-1",
"description": "Detached debugging symbols for ipv6toolkit",
"dependencies": []
},
"ipython2": {
"version": "5.10.0-4",
"description": "Provides a rich toolkit to help you make the most out of using Python interactively.",
"dependencies": [
"python2",
"python2-simplegeneric",
"python2-pexpect",
"python2-pathlib",
"python2-pickleshare",
"python2-setuptools",
"python2-prompt_toolkit1",
"python2-backports.shutil_get_terminal_size",
"python2-traitlets",
"sqlite"
]
},
"ircsnapshot": {
"version": "94.cb02a85-2",
"description": "Tool to gather information from IRC servers.",
"dependencies": [
"python2"
]
},
"irpas": {
"version": "0.10-6",
"description": "Internetwork Routing Protocol Attack Suite.",
"dependencies": []
},
"isf": {
"version": "68.5228865-4",
"description": "An exploitation framework based on Python.",
"dependencies": [
"python2",
"python2-pexpect",
"python2-paramiko",
"python2-argparse",
"python2-pysnmp",
"python2-python-nmap",
"python2-beautifulsoup4",
"python2-requests",
"python2-scapy",
"python2-setuptools"
]
},
"isip": {
"version": "2.fad1f10-5",
"description": "Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.",
"dependencies": [
"python2",
"python2-scapy",
"python2-termcolor",
"python2-dpkt",
"python2-wsgiref"
]
},
"isme": {
"version": "0.12-10",
"description": "Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN.",
"dependencies": [
"perl",
"perl-libwww",
"perl-html-parser",
"perl-net-ping",
"perl-net-tftp",
"perl-net-netmask",
"perl-net-subnet",
"perl-http-date",
"perl-net-rawip",
"perl-net-libdnet",
"perl-crypt-ssleay",
"perl-lwp-protocol-https",
"perl-mozilla-ca",
"perl-http-message",
"perl-net-ssh-perl",
"perl-tk",
"perl-net-dhcp"
]
},
"isr-form": {
"version": "1.0-4",
"description": "Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.",
"dependencies": [
"perl",
"perl-data-dump"
]
},
"issniff": {
"version": "294.79c6c2a-1",
"description": "Internet Session Sniffer.",
"dependencies": [
"libpcap"
]
},
"itpp": {
"version": "4.3.1-3",
"description": "C++ library of mathematical, signal processing and communication routines.",
"dependencies": [
"blas",
"lapack",
"fftw",
"perl"
]
},
"itpp-debug": {
"version": "4.3.1-3",
"description": "Detached debugging symbols for itpp",
"dependencies": []
},
"ivre": {
"version": "0.9.21.dev48-1",
"description": "Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,...",
"dependencies": [
"python-ivre"
]
},
"ivre-docs": {
"version": "0.9.21.dev48-1",
"description": "Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (documentation)",
"dependencies": []
},
"ivre-web": {
"version": "0.9.21.dev48-1",
"description": "Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,... (web application)",
"dependencies": [
"ivre",
"python-bottle"
]
},
"ja3": {
"version": "117.cb29184-9",
"description": "Standard for creating SSL client fingerprints in an easy to produce and shareable way.",
"dependencies": [
"python",
"python-dpkt"
]
},
"jaadas": {
"version": "0.1-1",
"description": "Joint Advanced Defect assEsment for android applications.",
"dependencies": [
"java-environment"
]
},
"jackdaw": {
"version": "416.1c3a4c2-5",
"description": "Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions.",
"dependencies": [
"python",
"python-aiosmb",
"python-msldap",
"python-sqlalchemy",
"python-tqdm",
"python-networkx",
"python-connexion",
"python-bidict",
"python-flask-sqlalchemy",
"python-websockets",
"python-cryptography",
"python-swagger-ui-bundle",
"python-werkzeug",
"python-minikerberos",
"python-colorama",
"python-winacl",
"python-pypykatz",
"python-asyauth",
"python-asysocks",
"python-igraph"
]
},
"jaeles": {
"version": "233.243e0b6-1",
"description": "The Swiss Army knife for automated Web Application Testing.",
"dependencies": []
},
"jaeles-debug": {
"version": "233.243e0b6-1",
"description": "Detached debugging symbols for jaeles",
"dependencies": []
},
"jaidam": {
"version": "18.15e0fec-3",
"description": "Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools,",
"dependencies": [
"python2"
]
},
"jast": {
"version": "17.361ecde-8",
"description": "Just Another Screenshot Tool.",
"dependencies": [
"python",
"python-selenium",
"python-requests",
"python-docopt",
"python-urllib3"
]
},
"java-openjfx-bin": {
"version": "17-1",
"description": "Java OpenJFX 17 client application platform (Gluon build).",
"dependencies": [
"ffmpeg",
"gstreamer",
"java-environment>=17",
"libxtst",
"qt5-base",
"webkit2gtk"
]
},
"javasnoop": {
"version": "1.1-7",
"description": "A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer",
"dependencies": []
},
"jbe": {
"version": "0.1.1-1",
"description": "Java bytecode editor suitable for viewing and modifying java class files.",
"dependencies": [
"java-environment"
]
},
"jboss-autopwn": {
"version": "1.3bc2d29-1",
"description": "A JBoss script for obtaining remote shell access.",
"dependencies": []
},
"jbrofuzz": {
"version": "2.5-3",
"description": "Web application protocol fuzzer that emerged from the needs of penetration testing.",
"dependencies": [
"java-environment"
]
},
"jbrute": {
"version": "1:0.99-3",
"description": "Open Source Security tool to audit hashed passwords.",
"dependencies": []
},
"jcrack": {
"version": "0.3.6-1",
"description": "A utility to create dictionary files that will crack the default passwords of select wireless gateways",
"dependencies": [
"bash",
"crunch"
]
},
"jd-cli": {
"version": "1.2.0-1",
"description": "Command line Java Decompiler.",
"dependencies": [
"java-environment"
]
},
"jdeserialize": {
"version": "31.20635ba-1",
"description": "A library that interprets Java serialized objects. It also comes with a command-line tool that can generate compilable class declarations, extract block data, and print textual representations of instance values.",
"dependencies": [
"java-runtime",
"java-environment"
]
},
"jd-gui": {
"version": "1.6.6-3",
"description": "A standalone graphical utility that displays Java source codes of .class files.",
"dependencies": [
"java-environment",
"libxtst"
]
},
"jeangrey": {
"version": "43.9bf3cf4-4",
"description": "A tool to perform differential fault analysis attacks (DFA).",
"dependencies": [
"python"
]
},
"jeb-android": {
"version": "3.7.0.201909272058-1",
"description": "Android decompiler.",
"dependencies": [
"java-environment",
"java-runtime-common"
]
},
"jeb-arm": {
"version": "5.20.0.202411121942-1",
"description": "Arm decompiler.",
"dependencies": [
"java-environment",
"java-runtime-common"
]
},
"jeb-intel": {
"version": "1:3.7.0.201909272058-1",
"description": "Intel decompiler.",
"dependencies": [
"java-environment",
"java-runtime-common"
]
},
"jeb-mips": {
"version": "1:5.20.0.202411121942-1",
"description": "Mips decompiler.",
"dependencies": [
"java-environment",
"java-runtime-common"
]
},
"jeb-webasm": {
"version": "3.7.0.201909272058-1",
"description": "WebAssembly decompiler.",
"dependencies": [
"java-environment",
"java-runtime-common"
]
},
"jefferson": {
"version": "v0.4.6.r0.g9e33796-1",
"description": "JFFS2 filesystem extraction tool.",
"dependencies": [
"python",
"python-click",
"python-cstruct",
"python-lzallright"
]
},
"jeopardize": {
"version": "5.34f1d07-8",
"description": "A low(zero) cost threat intelligence & response tool against phishing domains.",
"dependencies": [
"python",
"python-colorama",
"python-lxml",
"python-selenium",
"python-termcolor",
"python-requests",
"python-dnspython",
"python-chardet",
"python-psutil",
"python-dateutil",
"python-pytz",
"python-urllib3",
"python-certifi",
"python-python-whois"
]
},
"jexboss": {
"version": "86.338b531-3",
"description": "Jboss verify and Exploitation Tool.",
"dependencies": [
"python2",
"python2-urllib3",
"python2-ipaddress"
]
},
"jira-scan": {
"version": "7.447d0ec-3",
"description": "A simple remote scanner for Atlassian Jira",
"dependencies": [
"ruby",
"ruby-bundler",
"ruby-pkg-config",
"ruby-terminal-table",
"libxslt"
]
},
"jndi-injection-exploit": {
"version": "10.2dc4018-1",
"description": "A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc.",
"dependencies": [
"java-runtime"
]
},
"jnetmap": {
"version": "0.5.5-1",
"description": "A network monitor of sorts.",
"dependencies": [
"java-environment"
]
},
"johnny": {
"version": "20120424-8",
"description": "GUI for John the Ripper.",
"dependencies": [
"qt4>=4.7.0",
"john"
]
},
"jok3r": {
"version": "447.0761996-8",
"description": "Network and Web Pentest Framework.",
"dependencies": [
"python-argparse",
"python-blessed",
"python-beautifulsoup4",
"python-cmd2",
"python-colorama",
"python-colored",
"python-colorlog",
"python-enlighten",
"python-humanfriendly",
"python-prettytable",
"python-python-libnmap",
"python-regex",
"python-requests",
"python-six",
"python-sqlalchemy-utils",
"python-sqlalchemy",
"python-urllib3",
"python-pillow",
"python-ansi2html",
"python-selenium",
"python-tld",
"python-shodan"
]
},
"jomplug": {
"version": "0.1-3",
"description": "This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.",
"dependencies": [
"php"
]
},
"jondo": {
"version": "00.20.001-1",
"description": "Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests.",
"dependencies": [
"java-environment"
]
},
"jondobrowser": {
"version": "0.12-2",
"description": "Firefox tweaked to work with jondo (anonymous browsing) (english version)",
"dependencies": []
},
"jondoconsole": {
"version": "00.00.163-2",
"description": "Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests. CLI version.",
"dependencies": []
},
"jooforce": {
"version": "11.43c21ad-2",
"description": "A Joomla password brute force tester.",
"dependencies": [
"python2"
]
},
"joomlascan": {
"version": "1.2-5",
"description": "Joomla scanner scans for known vulnerable remote file inclusion paths and files.",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"joomlavs": {
"version": "254.eea7500-12",
"description": "A black box, Ruby powered, Joomla vulnerability scanner.",
"dependencies": [
"ruby",
"ruby-bundler",
"libxslt"
]
},
"joomscan": {
"version": "1:83.2ea8cc7-2",
"description": "Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.",
"dependencies": [
"perl-switch",
"perl-www-mechanize",
"perl-term-ansicolor"
]
},
"jpegdump": {
"version": "0.0.7-3",
"description": "Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them.",
"dependencies": [
"python2"
]
},
"jpexs-decompiler": {
"version": "15.1.0-1",
"description": "JPEXS Free Flash Decompiler.",
"dependencies": [
"java-environment"
]
},
"jsearch": {
"version": "44.87cf9c1-2",
"description": "Simple script that grep infos from javascript files.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests"
]
},
"jsfuck": {
"version": "235.e5c0274-1",
"description": "Write any JavaScript with 6 Characters: []()!+.",
"dependencies": [
"php"
]
},
"jshell": {
"version": "7.ee3c92d-5",
"description": "Get a JavaScript shell with XSS.",
"dependencies": [
"python"
]
},
"jsonbee": {
"version": "30.c0c87fc-1",
"description": "A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP).",
"dependencies": [
"php"
]
},
"jsparser": {
"version": "31.ccd3ab6-5",
"description": "Parse javascript using Tornado and JSBeautifier to discover interesting enpoints.",
"dependencies": [
"python2",
"python2-safeurl",
"python2-tornado",
"python2-jsbeautifier",
"python2-netaddr",
"python2-pycurl",
"python2-beautifulsoup4"
]
},
"jsql-injection": {
"version": "0.109-1",
"description": "A Java application for automatic SQL database injection.",
"dependencies": [
"java-environment"
]
},
"jstillery": {
"version": "65.512e9af-1",
"description": "Advanced JavaScript Deobfuscation via Partial Evaluation.",
"dependencies": [
"nodejs"
]
},
"juicy-potato": {
"version": "53.744d321-1",
"description": "A sugared version of RottenPotatoNG, with a bit of juice.",
"dependencies": []
},
"junkie": {
"version": "1365.70a83d6-1",
"description": "A modular packet sniffer and analyzer.",
"dependencies": []
},
"justdecompile": {
"version": "22018-2",
"description": "The decompilation engine of JustDecompile.",
"dependencies": []
},
"juumla": {
"version": "106.130565e-4",
"description": "Python tool created to identify Joomla version, scan for vulnerabilities and search for config files.",
"dependencies": [
"python",
"python-rich",
"python-requests",
"python-xmltodict"
]
},
"jwscan": {
"version": "7.874b3a5-2",
"description": "Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.",
"dependencies": [
"java-environment"
]
},
"jwtcat": {
"version": "77.f80f3d9-6",
"description": "Script performs offline brute-force attacks against JSON Web Token (JWT)",
"dependencies": [
"python",
"python-coloredlogs",
"python-pyjwt",
"python-tqdm"
]
},
"jwt-cracker": {
"version": "23.8130879-2",
"description": "JWT brute force cracker written in C.",
"dependencies": [
"openssl"
]
},
"jwt-hack-debug": {
"version": "v1.2.0.r0.g32e486b-1",
"description": "Detached debugging symbols for jwt-hack",
"dependencies": []
},
"jwt-hack": {
"version": "v1.2.0.r0.g32e486b-1",
"description": "A tool for hacking / security testing to JWT.",
"dependencies": [
"glibc"
]
},
"jwt-key-recovery": {
"version": "11.094df95-5",
"description": "Recovers the public key used to sign JWT tokens.",
"dependencies": [
"python",
"python-gmpy2",
"python-pycryptodome",
"python-fastecdsa"
]
},
"jwt-tool": {
"version": "73.e4f380f-4",
"description": "Toolkit for validating, forging and cracking JWTs (JSON Web Tokens).",
"dependencies": [
"python",
"python-pycryptodomex",
"python-termcolor",
"python-cprint",
"python-requests"
]
},
"jynx2": {
"version": "2.0-3",
"description": "An expansion of the original Jynx LD_PRELOAD rootkit",
"dependencies": []
},
"k55": {
"version": "86.b3c4aa9-1",
"description": "Linux x86_64 Process Injection Utility.",
"dependencies": []
},
"kacak": {
"version": "1.0-3",
"description": "Tools for penetration testers that can enumerate which users logged on windows system.",
"dependencies": [
"python2",
"python2-lxml",
"python2-python-nmap",
"metasploit"
]
},
"kadimus": {
"version": "183.ac5f438-1",
"description": "LFI Scan & Exploit Tool.",
"dependencies": [
"curl",
"pcre",
"libssh",
"openssl"
]
},
"kadimus-debug": {
"version": "183.ac5f438-1",
"description": "Detached debugging symbols for kadimus",
"dependencies": []
},
"kalibrate-rtl": {
"version": "69.340003e-1",
"description": "Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices.",
"dependencies": [
"rtl-sdr",
"fftw"
]
},
"kamerka": {
"version": "1:47.23a9bd6-2",
"description": "Build interactive map of cameras from Shodan.",
"dependencies": [
"python"
]
},
"katana-framework": {
"version": "1.0.0.1-4",
"description": "A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others).",
"dependencies": [
"python2",
"python2-lxml",
"aircrack-ng",
"nmap",
"ettercap",
"python2-isc_dhcp_leases",
"hostapd",
"xterm",
"python2-scapy",
"python2-dnslib",
"python2-ipy",
"python2-setuptools",
"python2-beautifulsoup4",
"python2-future"
]
},
"katana-framework-debug": {
"version": "1.0.0.1-4",
"description": "Detached debugging symbols for katana-framework",
"dependencies": []
},
"katana-pd-debug": {
"version": "v1.1.2.r2.gb155052-1",
"description": "Detached debugging symbols for katana-pd",
"dependencies": []
},
"katana-pd": {
"version": "v1.1.2.r2.gb155052-1",
"description": "Crawling and spidering framework.",
"dependencies": []
},
"katsnoop": {
"version": "0.1-2",
"description": "Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.",
"dependencies": [
"libpcap"
]
},
"kautilya": {
"version": "52.1c9d5b0-12",
"description": "Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.",
"dependencies": [
"ruby",
"ruby-bundler",
"libpcap"
]
},
"keimpx": {
"version": "3:300.37190f4-7",
"description": "Tool to verify the usefulness of credentials across a network over SMB.",
"dependencies": [
"python",
"impacket",
"python-pycryptodome"
]
},
"kekeo": {
"version": "2.2.0_20211214-1",
"description": "A little toolbox to play with Microsoft Kerberos in C.",
"dependencies": []
},
"kerbcrack": {
"version": "1.3d3-1",
"description": "Kerberos sniffer and cracker for Windows.",
"dependencies": []
},
"kerberoast": {
"version": "1:0.2.0.r9.g82f5bb2-5",
"description": "Kerberoast attack -pure python-.",
"dependencies": [
"python",
"python-msldap",
"python-minikerberos",
"python-unicrypto",
"python-asyauth"
]
},
"kerbrute": {
"version": "90.9cfb81e-2",
"description": "A tool to perform Kerberos pre-auth bruteforcing.",
"dependencies": []
},
"kernelpop": {
"version": "238.b3467d3-1",
"description": "Kernel privilege escalation enumeration and exploitation framework.",
"dependencies": [
"python"
]
},
"keye": {
"version": "29.d44a578-8",
"description": "Recon tool detecting changes of websites based on content-length differences.",
"dependencies": [
"python",
"python-requests",
"python-argparse"
]
},
"kh2hc": {
"version": "0.0.1.r60.gc9377e2-1",
"description": "Convert OpenSSH known_hosts file hashed with HashKnownHosts to hashes crackable by Hashcat.",
"dependencies": [
"ruby",
"ruby-docopt",
"ctf-party"
]
},
"khc": {
"version": "0.2-4",
"description": "A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.",
"dependencies": [
"openssl"
]
},
"kickthemout": {
"version": "212.861aea2-8",
"description": "Kick devices off your network by performing an ARP Spoof attack.",
"dependencies": [
"python",
"python-scapy",
"kamene",
"python-python-nmap",
"nmap"
]
},
"killcast": {
"version": "30.ee81cfa-8",
"description": "Manipulate Chromecast Devices in your Network.",
"dependencies": [
"python",
"python-requests"
]
},
"killerbee": {
"version": "398.748740d-6",
"description": "Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.",
"dependencies": [
"python",
"python-pycryptodome",
"python-pyusb",
"pygtk",
"python-cairo",
"python-pyserial",
"python-scapy",
"python-rangeparser"
]
},
"killerbee-debug": {
"version": "398.748740d-6",
"description": "Detached debugging symbols for killerbee",
"dependencies": []
},
"kimi": {
"version": "28.e7cafda-4",
"description": "Script to generate malicious debian packages (debain trojans).",
"dependencies": [
"python2"
]
},
"kippo": {
"version": "287.b9eb06a-3",
"description": "A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.",
"dependencies": [
"python2",
"python2-twistedx",
"python2-pycryptodome",
"python2-pyasn1"
]
},
"kismet2earth": {
"version": "1.0-1",
"description": "A set of utilities that convert from Kismet logs to Google Earth .kml format",
"dependencies": []
},
"kismet-earth": {
"version": "1:0.1-10",
"description": "Various scripts to convert kismet logs to kml file to be used in Google Earth.",
"dependencies": [
"perl",
"python"
]
},
"kismon": {
"version": "1.0.3-7",
"description": "GUI client for kismet (wireless scanner/sniffer/monitor).",
"dependencies": [
"python",
"gtk3",
"gobject-introspection-runtime",
"python-simplejson",
"python-cairo",
"osm-gps-map",
"python-gobject",
"python-requests",
"python-lxml",
"kismet",
"python-kismet-rest"
]
},
"kiterunner": {
"version": "19.7d5824c-1",
"description": "Contextual Content Discovery Tool.",
"dependencies": []
},
"kitty-framework": {
"version": "352.cb07609-3",
"description": "Fuzzing framework written in python.",
"dependencies": [
"python2",
"python2-docopt",
"python2-six",
"python2-requests",
"python2-bitstring"
]
},
"klar": {
"version": "2.4.0-1",
"description": "Integration of Clair and Docker Registry.",
"dependencies": []
},
"klee": {
"version": "2.1-2",
"description": "A symbolic virtual machine built on top of the LLVM compiler infrastructure.",
"dependencies": [
"gperftools",
"z3",
"libcap",
"python",
"llvm-libs",
"klee-uclibc",
"sqlite"
]
},
"klee-uclibc": {
"version": "1.2-1",
"description": "KLEE's version of uClibc.",
"dependencies": []
},
"klogger": {
"version": "1.0-5",
"description": "A keystroke logger for the NT-series of Windows.",
"dependencies": []
},
"knock": {
"version": "2:100.d6de173-4",
"description": "Subdomain scanner.",
"dependencies": [
"python",
"python-dnspython",
"python-colorama",
"python-beautifulsoup4",
"python-requests",
"python-networkx",
"python-matplotlib"
]
},
"knxmap": {
"version": "252.6f40dd1-6",
"description": "KNXnet/IP scanning and auditing tool for KNX home automation installations.",
"dependencies": [
"python"
]
},
"koadic": {
"version": "1:637.ac46c44-2",
"description": "A Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire.",
"dependencies": [
"impacket",
"python",
"python-pycryptodome",
"python-pyasn1",
"python-tabulate",
"python-flask",
"python-rjsmin"
]
},
"kolkata": {
"version": "3.0-3",
"description": "A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.",
"dependencies": []
},
"konan": {
"version": "23.7b5ac80-1",
"description": "Advanced Web Application Dir Scanner.",
"dependencies": [
"python2",
"python2-colorama",
"python2-requests",
"python2-urllib3",
"python2-pathlib"
]
},
"kraken": {
"version": "32.368a837-1",
"description": "A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.",
"dependencies": []
},
"krbjack": {
"version": "1.2.0-4",
"description": "DNS dynamic update abuse in ADIDNS and MitM attack using Kerberos AP-REQ hijacking.",
"dependencies": [
"python",
"python-scapy",
"impacket-ba",
"python-dnspython",
"python-colorama"
]
},
"krbrelayx": {
"version": "61.aef69a7-1",
"description": "Kerberos unconstrained delegation abuse toolkit.",
"dependencies": [
"python2-ldapdomaindump",
"python2",
"python2-argparse",
"python2-ldap3",
"python2-pycryptodome",
"python2-pyasn1",
"python2-dnspython",
"python2-pycryptodomex",
"python2-impacket",
"python2-setuptools"
]
},
"kscan-debug": {
"version": "v1.85.r55.gcf76af2-1",
"description": "Detached debugging symbols for kscan",
"dependencies": []
},
"kscan": {
"version": "v1.85.r55.gcf76af2-1",
"description": "Asset mapping tool that can perform port scanning, TCP fingerprinting and banner capture for specified assets.",
"dependencies": []
},
"kube-hunter": {
"version": "703.bc47f08-7",
"description": "Hunt for security weaknesses in Kubernetes clusters.",
"dependencies": [
"python",
"python-netaddr",
"python-netifaces",
"python-scapy",
"python-requests",
"python-prettytable",
"python-urllib3",
"python-ruamel-yaml",
"python-future",
"python-packaging",
"python-pluggy",
"python-kubernetes"
]
},
"kubesploit": {
"version": "86.2de2f12-1",
"description": "Cross-platform post-exploitation HTTP/2 Command & Control server.",
"dependencies": [
"glibc"
]
},
"kubestriker": {
"version": "39.e1776ea-8",
"description": "A Blazing fast Security Auditing tool for Kubernetes.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"kubolt": {
"version": "28.0027239-7",
"description": "Utility for scanning public kubernetes clusters.",
"dependencies": [
"python",
"python-click",
"python-requests",
"python-shodan"
]
},
"kwetza": {
"version": "26.0e50272-3",
"description": "Python script to inject existing Android applications with a Meterpreter payload.",
"dependencies": [
"android-apktool",
"metasploit",
"python2",
"python2-beautifulsoup4"
]
},
"l0l": {
"version": "322.1319ea7-1",
"description": "The Exploit Development Kit.",
"dependencies": [
"python2"
]
},
"laf": {
"version": "12.7a456b3-5",
"description": "Login Area Finder: scans host/s for login panels.",
"dependencies": [
"python2",
"python2-requests"
]
},
"lanmap2": {
"version": "1:127.1197999-3",
"description": "Passive network mapping tool.",
"dependencies": []
},
"lans": {
"version": "1:148.9f8ef2d-6",
"description": "A Multithreaded asynchronous packet parsing/injecting arp spoofer.",
"dependencies": [
"python2",
"python2-scapy",
"python2-nfqueue",
"aircrack-ng",
"python2-twistedx",
"python2-requests",
"nbtscan"
]
},
"latd": {
"version": "1.31-1",
"description": "A LAT terminal daemon for Linux and BSD.",
"dependencies": []
},
"laudanum": {
"version": "1.0-2",
"description": "A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.",
"dependencies": []
},
"lazagne": {
"version": "880.30aebe9-1",
"description": "An open source application used to retrieve lots of passwords stored on a local computer.",
"dependencies": [
"python",
"python-argparse",
"python-psutil",
"python-pycryptodome",
"python-pyasn1",
"python-pydes",
"python-pbkdf2",
"python-libkeepass"
]
},
"lazydroid": {
"version": "25.0f559ec-1",
"description": "Tool written as a bash script to facilitate some aspects of an Android Assessment",
"dependencies": [
"wget"
]
},
"lbd": {
"version": "20130719-6",
"description": "Load Balancing detector,",
"dependencies": [
"bash",
"dnsutils",
"openbsd-netcat"
]
},
"lbmap": {
"version": "147.2d15ace-4",
"description": "Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.",
"dependencies": [
"perl",
"perl-data-dump",
"perl-io-socket-ssl",
"perl-getopt-long"
]
},
"ldap-brute": {
"version": "21.acc06e3-4",
"description": "A semi fast tool to bruteforce values of LDAP injections over HTTP.",
"dependencies": [
"python2",
"python2-httmock",
"python2-mock",
"python2-requests"
]
},
"ldapdomaindump": {
"version": "0.9.4-4",
"description": "Active Directory information dumper via LDAP.",
"dependencies": [
"python",
"python-ldap3",
"python-future",
"python-dnspython"
]
},
"ldapenum": {
"version": "1:0.1-7",
"description": "Enumerate domain controllers using LDAP.",
"dependencies": [
"perl",
"perl-ldap",
"perl-net-nslookup",
"perl-net-dns"
]
},
"ldapmonitor": {
"version": "1.4.r12.g498e048-4",
"description": "Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!",
"dependencies": [
"python",
"python-ldap3",
"python-pycryptodome",
"python-sectools"
]
},
"ldapscripts": {
"version": "2.0.8-4",
"description": "Simple shell scripts to handle POSIX entries in an LDAP directory.",
"dependencies": [
"openldap",
"sharutils"
]
},
"ldeep": {
"version": "1:1.0.81.r0.gfcbbce5-1",
"description": "In-depth ldap enumeration utility.",
"dependencies": [
"python",
"python-dnspython",
"python-cryptography",
"python-ldap3",
"python-tqdm",
"python-termcolor",
"python-commandparse",
"python-pycryptodomex",
"python-six",
"python-gssapi",
"python-oscrypto",
"python-pycryptodome"
]
},
"ld-shatner": {
"version": "4.5c215c4-2",
"description": "ld-linux code injector.",
"dependencies": [
"gcc-libs-multilib",
"gcc-multilib"
]
},
"ldsview": {
"version": "47.d8bfcaa-1",
"description": "Offline search tool for LDAP directory dumps in LDIF format.",
"dependencies": []
},
"leaklooker": {
"version": "5.0d2b9fc-1",
"description": "Find open databases with Shodan.",
"dependencies": [
"python",
"python-colorama",
"python-shodan",
"python-hurry-filesize"
]
},
"leechcore": {
"version": "2.18-1",
"description": "Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent.",
"dependencies": [
"libusb"
]
},
"leechcore-debug": {
"version": "2.18-1",
"description": "Detached debugging symbols for leechcore",
"dependencies": []
},
"leena": {
"version": "2.5119f56-1",
"description": "Symbolic execution engine for JavaScript",
"dependencies": [
"nodejs"
]
},
"legion": {
"version": "61.ca99853-5",
"description": "Automatic Enumeration Tool based in Open Source tools.",
"dependencies": [
"python",
"python-termcolor",
"dirhunt",
"arjun",
"dirsearch",
"impacket",
"rpcbind"
]
},
"leo": {
"version": "35879.691228a89-1",
"description": "Literate programmer's editor, outliner, and project manager.",
"dependencies": [
"python",
"tk",
"python-pmw",
"python-pyqt5",
"python-yaml",
"python-flask"
]
},
"leroy-jenkins": {
"version": "3.bdc3965-4",
"description": "A python tool that will allow remote execution of commands on a Jenkins server and its nodes.",
"dependencies": [
"python2",
"python2-pycurl",
"pygtk"
]
},
"lethalhta": {
"version": "2.5602402-1",
"description": "Lateral Movement technique using DCOM and HTA.",
"dependencies": [
"mono"
]
},
"letmefuckit-scanner": {
"version": "3.f3be22b-4",
"description": "Scanner and Exploit Magento.",
"dependencies": [
"python2",
"python2-pygoogle-simple"
]
},
"leviathan": {
"version": "35.a1a1d8c-4",
"description": "A mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities.",
"dependencies": [
"python2",
"python2-requests",
"python2-paramiko",
"python2-argparse",
"python2-beautifulsoup4",
"python2-lxml",
"python2-shodan",
"python2-google-api-python-client"
]
},
"levye": {
"version": "1:84.5406303-1",
"description": "A brute force tool which is support sshkey, vnckey, rdp, openvpn.",
"dependencies": []
},
"lfi-autopwn": {
"version": "3.0-3",
"description": "A Perl script to try to gain code execution on a remote server via LFI",
"dependencies": []
},
"lfi-exploiter": {
"version": "1.1-4",
"description": "This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..",
"dependencies": [
"perl",
"perl-libwww"
]
},
"lfifreak": {
"version": "21.0c6adef-4",
"description": "A unique automated LFi Exploiter with Bind/Reverse Shells.",
"dependencies": [
"python2",
"python2-beautifulsoup4"
]
},
"lfi-fuzzploit": {
"version": "1.1-6",
"description": "A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.",
"dependencies": [
"python2"
]
},
"lfi-image-helper": {
"version": "0.8-5",
"description": "A simple script to infect images with PHP Backdoors for local file inclusion attacks.",
"dependencies": [
"perl",
"perl-image-exiftool",
"perl-color-output"
]
},
"lfimap": {
"version": "1:286.ac1f29c-1",
"description": "Local file inclusion discovery and exploitation tool.",
"dependencies": [
"python",
"python-requests",
"python-urllib3",
"python-pybase64"
]
},
"lfi-scanner": {
"version": "4.0-5",
"description": "This is a simple perl script that enumerates local file inclusion attempts when given a specific target.",
"dependencies": [
"perl",
"perl-libwww",
"perl-http-message"
]
},
"lfi-sploiter": {
"version": "1.0-6",
"description": "This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"lfisuite": {
"version": "85.470e01f-3",
"description": "Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner.",
"dependencies": [
"python2"
]
},
"lfle": {
"version": "24.f28592c-6",
"description": "Recover event log entries from an image by heurisitically looking for record structures.",
"dependencies": [
"python2",
"python2-python-evt"
]
},
"lft": {
"version": "1:3.91-1",
"description": "A layer four traceroute implementing numerous other features.",
"dependencies": [
"libpcap"
]
},
"lhf": {
"version": "40.51568ee-4",
"description": "A modular recon tool for pentesting.",
"dependencies": [
"python2",
"arachni",
"dirb",
"nmap",
"hydra",
"sqlmap",
"enum4linux",
"nikto",
"python2-python-libnmap",
"python2-selenium",
"python2-psutil"
]
},
"lib32-openssl-1.0": {
"version": "1.0.2.u-3",
"description": "The Open Source toolkit for Secure Sockets Layer and Transport Layer Security.",
"dependencies": [
"lib32-glibc",
"openssl-1.0"
]
},
"libbde": {
"version": "1:338.3628220-3",
"description": "A library to access the BitLocker Drive Encryption (BDE) format.",
"dependencies": [
"python",
"python2"
]
},
"libbde-debug": {
"version": "1:338.3628220-3",
"description": "Detached debugging symbols for libbde",
"dependencies": []
},
"libbfio": {
"version": "324.5b07d07-1",
"description": "A library to provide basic file input/output abstraction.",
"dependencies": []
},
"libbfio-debug": {
"version": "324.5b07d07-1",
"description": "Detached debugging symbols for libbfio",
"dependencies": []
},
"libbtbb": {
"version": "2020.12.R1-3",
"description": "A library to decode Bluetooth baseband packets, as produced by the Ubertooth and GR-Bluetooth projects.",
"dependencies": [
"glibc",
"python2",
"python2-pcapy",
"python2-pypcap"
]
},
"libbtbb-debug": {
"version": "2020.12.R1-3",
"description": "Detached debugging symbols for libbtbb",
"dependencies": []
},
"libc-database": {
"version": "45.69815cd-1",
"description": "Database of libc offsets to simplify exploitation.",
"dependencies": []
},
"libdaq": {
"version": "2.0.7-1",
"description": "Data Acquisition library for packet I/O.",
"dependencies": [
"libpcap"
]
},
"libdb": {
"version": "5.3.28-1",
"description": "Berkley DB.",
"dependencies": [
"glibc"
]
},
"libdb-debug": {
"version": "5.3.28-1",
"description": "Detached debugging symbols for libdb",
"dependencies": []
},
"libdisasm": {
"version": "0.23-1",
"description": "A disassembler library.",
"dependencies": []
},
"libdnet-ipv6": {
"version": "1.12-3",
"description": "A simplified, portable interface to several low-level networking routines",
"dependencies": []
},
"libee": {
"version": "0.4.1-4",
"description": "Event expression library inspired by CEE.",
"dependencies": [
"libestr",
"glibc"
]
},
"libemu": {
"version": "584.bf443cb-1",
"description": "A small library written in c offering basic x86 emulation and shellcode detection.",
"dependencies": [
"glibc"
]
},
"libemu-debug": {
"version": "584.bf443cb-1",
"description": "Detached debugging symbols for libemu",
"dependencies": []
},
"libestr": {
"version": "0.1.11-1",
"description": "Essentials for string handling (and a bit more).",
"dependencies": []
},
"libevtx": {
"version": "20181227-7",
"description": "Library and tools to access the Windows XML Event Log (EVTX) format.",
"dependencies": [
"libbfio"
]
},
"libfastjson": {
"version": "0.99.9-1",
"description": "A performance-focused json library for C.",
"dependencies": []
},
"libfixbuf": {
"version": "3.0.0.alpha2-1",
"description": "IPFIX Message Format Implementation.",
"dependencies": [
"glib2"
]
},
"libfixbuf-debug": {
"version": "3.0.0.alpha2-1",
"description": "Detached debugging symbols for libfixbuf",
"dependencies": []
},
"libfvde": {
"version": "207.03f12f5-1",
"description": "Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes.",
"dependencies": [
"libxml2",
"openssl"
]
},
"libfvde-debug": {
"version": "207.03f12f5-1",
"description": "Detached debugging symbols for libfvde",
"dependencies": []
},
"libgksu": {
"version": "2.0.12-9",
"description": "gksu authorization library.",
"dependencies": [
"gconf",
"gtk2",
"libgnome-keyring",
"libgtop",
"startup-notification"
]
},
"libglade": {
"version": "2.6.4-8",
"description": "Allows you to load glade interface files in a program at runtime.",
"dependencies": [
"gtk2",
"libxml2"
]
},
"libicu52": {
"version": "52.1-2",
"description": "International Components for Unicode library.",
"dependencies": [
"gcc-libs"
]
},
"libicu64": {
"version": "64.2-1",
"description": "International Components for Unicode library.",
"dependencies": [
"gcc-libs"
]
},
"libjodycode": {
"version": "3.1-1",
"description": "Shared code used by several utilities written by Jody Bruchon.",
"dependencies": [
"glibc"
]
},
"libjodycode-debug": {
"version": "3.1-1",
"description": "Detached debugging symbols for libjodycode",
"dependencies": []
},
"liblognorm": {
"version": "2.0.6-3",
"description": "Log normalization library for rsyslog.",
"dependencies": [
"libee",
"json-c",
"python2-sphinx",
"libfastjson"
]
},
"liblognorm-debug": {
"version": "2.0.6-3",
"description": "Detached debugging symbols for liblognorm",
"dependencies": []
},
"libnl1": {
"version": "1.1.4-4",
"description": "Library for applications dealing with netlink sockets (Legacy version).",
"dependencies": [
"glibc"
]
},
"libnl1-debug": {
"version": "1.1.4-4",
"description": "Detached debugging symbols for libnl1",
"dependencies": []
},
"libosip2": {
"version": "5.3.1-1",
"description": "An implementation of SIP.",
"dependencies": [
"glibc"
]
},
"libosip2-debug": {
"version": "5.3.1-1",
"description": "Detached debugging symbols for libosip2",
"dependencies": []
},
"libosmocore": {
"version": "2:1.10.0.r47.g38eb428-1",
"description": "Collection of common code used in various sub-projects inside the Osmocom family of projects.",
"dependencies": [
"talloc",
"pcsclite",
"lksctp-tools",
"libusb",
"lksctp-tools",
"liburing",
"libmnl",
"python"
]
},
"libosmocore-debug": {
"version": "2:1.10.0.r47.g38eb428-1",
"description": "Detached debugging symbols for libosmocore",
"dependencies": []
},
"libowfat": {
"version": "0.32-2",
"description": "GPL reimplementation of libdjb.",
"dependencies": [
"dietlibc"
]
},
"libparistraceroute": {
"version": "380.455f5ef-1",
"description": "A library written in C dedicated to active network measurements with examples, such as paris-ping and paris-traceroute.",
"dependencies": [
"glibc"
]
},
"libparistraceroute-debug": {
"version": "380.455f5ef-1",
"description": "Detached debugging symbols for libparistraceroute",
"dependencies": []
},
"libpcap-1.4": {
"version": "1.4.0-4",
"description": "A system-independent interface for user-level packet capture",
"dependencies": [
"glibc",
"libnl",
"sh",
"libusb"
]
},
"libpff": {
"version": "219.2f90504-1",
"description": "A library to access the Personal Folder File (PFF) and the Offline Folder File (OFF) format.",
"dependencies": [
"libbfio"
]
},
"libpff-debug": {
"version": "219.2f90504-1",
"description": "Detached debugging symbols for libpff",
"dependencies": []
},
"libpfm4": {
"version": "4.11.0-2",
"description": "Library to encode performance events for use by perf tool.",
"dependencies": [
"glibc"
]
},
"libpfring": {
"version": "2:7.6.0.r48.gb5d63335-1",
"description": "Library to interface with the PF_RING kernel module.",
"dependencies": [
"numactl",
"pfring-dkms"
]
},
"libpjf": {
"version": "204.a6fb2f5-2",
"description": "A C library of data structures with tools (based on libasn).",
"dependencies": [
"pcre"
]
},
"libpjf-debug": {
"version": "204.a6fb2f5-2",
"description": "Detached debugging symbols for libpjf",
"dependencies": []
},
"libsdrplay": {
"version": "3.15.2-1",
"description": "Modules for the SDRplay receiver.",
"dependencies": [
"libusb"
]
},
"libsdrplay-debug": {
"version": "3.15.2-1",
"description": "Detached debugging symbols for libsdrplay",
"dependencies": []
},
"libtins": {
"version": "1305.fe22186-1",
"description": "High-level, multiplatform C++ network packet sniffing and crafting library.",
"dependencies": [
"libpcap",
"openssl",
"boost"
]
},
"libtins-debug": {
"version": "1305.fe22186-1",
"description": "Detached debugging symbols for libtins",
"dependencies": []
},
"libtirpc-compat": {
"version": "0.1-4",
"description": "Transport Independent RPC library (SunRPC replacement, backwards compatible links).",
"dependencies": [
"libtirpc"
]
},
"libvidcap": {
"version": "0.2.1-2",
"description": "A cross-platform library for capturing video from webcams and other video capture devices.",
"dependencies": []
},
"libvmdk-python": {
"version": "20191221-4",
"description": "Library and tools to access the VMware Virtual Disk (VMDK) format.",
"dependencies": []
},
"libvmi": {
"version": "1:1440.c461e20-2",
"description": "A virtual machine introspection library.",
"dependencies": [
"json-c"
]
},
"libvshadow": {
"version": "184.9070531-1",
"description": "A library to access the Volume Shadow Snapshot (VSS) format.",
"dependencies": [
"libbfio"
]
},
"libvshadow-debug": {
"version": "184.9070531-1",
"description": "Detached debugging symbols for libvshadow",
"dependencies": []
},
"lief": {
"version": "0.15.1-2",
"description": "Library to instrument executable formats.",
"dependencies": [
"tl-expected"
]
},
"lief-debug": {
"version": "0.15.1-2",
"description": "Detached debugging symbols for lief",
"dependencies": []
},
"liffy": {
"version": "1:33.89dd4f8-1",
"description": "A Local File Inclusion Exploitation tool.",
"dependencies": [
"python",
"python-requests",
"python-daemon",
"python-pyfiglet",
"python-argparse"
]
},
"lightblue": {
"version": "0.4-4",
"description": "A cross-platform Bluetooth API for Python which provides simple access to Bluetooth operations",
"dependencies": [
"python2",
"bluez-libs",
"openobex"
]
},
"lightblue-debug": {
"version": "0.4-4",
"description": "Detached debugging symbols for lightblue",
"dependencies": []
},
"lightbulb": {
"version": "88.9e8d6f3-5",
"description": "Python framework for auditing web applications firewalls.",
"dependencies": [
"python2",
"python2-cliff",
"python2-sfalearn",
"python2-symautomata",
"python2-prettytable",
"python2-setuptools",
"python2-contextlib2",
"python2-backports.functools_lru_cache"
]
},
"ligolo-ng-debug": {
"version": "v0.7.5.r1.g9c75364-1",
"description": "Detached debugging symbols for ligolo-ng",
"dependencies": []
},
"ligolo-ng": {
"version": "v0.7.5.r1.g9c75364-1",
"description": "An advanced, yet simple, tunneling tool that uses a TUN interface.",
"dependencies": [
"glibc"
]
},
"limeaide": {
"version": "305.ce3c9b7-8",
"description": "Remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host.",
"dependencies": [
"python",
"python-paramiko",
"python-argparse",
"python-termcolor"
]
},
"limelighter": {
"version": "17.d119dc7-1",
"description": "A tool for generating fake code signing certificates or signing real ones.",
"dependencies": [
"openssl",
"osslsigncode"
]
},
"linenum": {
"version": "75.c47f9b2-1",
"description": "Scripted Local Linux Enumeration & Privilege Escalation Checks",
"dependencies": []
},
"linikatz": {
"version": "48.d9cfdbf-1",
"description": "Tool to attack AD on UNIX.",
"dependencies": []
},
"linkedin2username": {
"version": "1:144.8889f30-5",
"description": "OSINT Tool: Generate username lists for companies on LinkedIn.",
"dependencies": [
"python",
"python-requests"
]
},
"linkedint": {
"version": "1.1.FIX.r8.g89ab1d3-1",
"description": "LinkedIn Recon Tool.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-certifi",
"python-chardet",
"python-idna",
"python-requests",
"python-thready",
"python-urllib3"
]
},
"linkfinder": {
"version": "168.1debac5-5",
"description": "Discovers endpoint and their parameters in JavaScript files.",
"dependencies": [
"python",
"python-argparse",
"python-jsbeautifier"
]
},
"linset": {
"version": "9.8746b1f-4",
"description": "Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.",
"dependencies": [
"aircrack-ng",
"gawk",
"curl",
"dhcp",
"hostapd",
"wireless_tools",
"lighttpd",
"macchanger",
"mdk3",
"php-cgi",
"pyrit",
"python",
"unzip",
"xterm"
]
},
"linux-exploit-suggester": {
"version": "32.9db2f5a-5",
"description": "A Perl script that tries to suggest exploits based OS version number.",
"dependencies": [
"perl"
]
},
"linux-exploit-suggester.sh": {
"version": "171.2063aeb-1",
"description": "Linux privilege escalation auditing tool.",
"dependencies": [
"bash",
"wget"
]
},
"linux-inject": {
"version": "100.268d4e4-1",
"description": "Tool for injecting a shared object into a Linux process.",
"dependencies": [
"lib32-gcc-libs",
"gcc-libs"
]
},
"linux-smart-enumeration": {
"version": "299.eb80976-1",
"description": "Linux enumeration tool for pentesting and CTFs with verbosity levels.",
"dependencies": [
"bash"
]
},
"lisa.py": {
"version": "61.2d1f81a-1",
"description": "An Exploit Dev Swiss Army Knife.",
"dependencies": [
"python2",
"lldb"
]
},
"list-urls": {
"version": "0.1-5",
"description": "Extracts links from webpage.",
"dependencies": [
"python2"
]
},
"littleblackbox": {
"version": "0.1.3-2",
"description": "Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.",
"dependencies": []
},
"littlebrother": {
"version": "112.338cf82-7",
"description": "OSINT tool to get informations on French, Belgian and Swizerland people.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-terminaltables",
"python-colorama",
"python-exifread"
]
},
"loadlibrary": {
"version": "104.c40033b-1",
"description": "Porting Windows Dynamic Link Libraries to Linux.",
"dependencies": [
"cabextract",
"readline",
"gcc",
"lib32-glibc",
"lib32-gcc-libs"
]
},
"local-php-security-checker-debug": {
"version": "v2.1.3.r1.g1d1fdac-1",
"description": "Detached debugging symbols for local-php-security-checker",
"dependencies": []
},
"local-php-security-checker": {
"version": "v2.1.3.r1.g1d1fdac-1",
"description": "A command line tool that checks your PHP application packages with known security vulnerabilities.",
"dependencies": []
},
"locasploit": {
"version": "117.fa48151-4",
"description": "Local enumeration and exploitation framework.",
"dependencies": [
"python3",
"binwalk",
"python2-scapy"
]
},
"lodowep": {
"version": "1.2.1-5",
"description": "Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.",
"dependencies": [
"java-environment"
]
},
"log4j-bypass": {
"version": "33.f5c92f9-6",
"description": "Log4j web app tester that includes WAF bypasses.",
"dependencies": [
"python",
"python-requests",
"python-pycryptodome",
"python-termcolor"
]
},
"log4j-scan": {
"version": "88.07f7e32-6",
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228.",
"dependencies": [
"python",
"python-requests",
"python-termcolor",
"python-pycryptodome"
]
},
"log-file-parser": {
"version": "60.c7a0ae7e-2",
"description": "Parser for $LogFile on NTFS.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"logkeys": {
"version": "97.98aac72-2",
"description": "A GNU/Linux keylogger that worked.",
"dependencies": [
"procps-ng",
"kbd"
]
},
"logkeys-debug": {
"version": "97.98aac72-2",
"description": "Detached debugging symbols for logkeys",
"dependencies": []
},
"logmepwn": {
"version": "24.f257a8f-1",
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"dependencies": [
"glibc"
]
},
"logmepwn-debug": {
"version": "24.f257a8f-1",
"description": "Detached debugging symbols for logmepwn",
"dependencies": []
},
"loic": {
"version": "2.9.9.99-1",
"description": "An open source network stress tool for Windows.",
"dependencies": [
"mono"
]
},
"loki": {
"version": "0.3.0_r502-1",
"description": "Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols.",
"dependencies": [
"python2",
"pygtk",
"python2-ipy",
"python2-dpkt",
"python2-urwid",
"python2-pylibpcap",
"libpcap",
"libdnet",
"libglade"
]
},
"loki-scanner": {
"version": "1255.687e211-3",
"description": "Simple IOC and Incident Response Scanner.",
"dependencies": [
"python2",
"python2-colorama",
"python2-psutil",
"python2-yara",
"python2-pylzma",
"python2-pycurl",
"python2-simplejson",
"python2-pytz",
"python2-requests",
"python2-argparse",
"python2-ipy",
"python2-netaddr",
"python2-beautifulsoup4",
"python2-pycryptodome",
"python2-tzlocal",
"python2-rfc5424-logging-handler",
"python2-helpers"
]
},
"lolbas": {
"version": "192.d148d27-1",
"description": "Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts).",
"dependencies": []
},
"loot": {
"version": "51.656fb85-1",
"description": "Sensitive information extraction tool.",
"dependencies": []
},
"lorcon-old": {
"version": "1:1.0825ec0-1",
"description": "Create what libradiate could have been: A generic library for injecting 802.11 frames, capable of injection via multiple driver frameworks, without forcing modification of the application code, old API version.",
"dependencies": [
"libnl",
"libpcap"
]
},
"lorg": {
"version": "98.aa4f1a3-1",
"description": "Apache Logfile Security Analyzer.",
"dependencies": [
"php"
]
},
"lorsrf": {
"version": "1:v2.1.r3.g5c69453-1",
"description": "Find the parameters that can be used to find SSRF or Out-of-band resource load.",
"dependencies": []
},
"lotophagi": {
"version": "0.1-5",
"description": "a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.",
"dependencies": [
"perl",
"perl-libwww"
]
},
"lrod": {
"version": "Version.r34.gbdd9b82-1",
"description": "Perform subdomain enumeration, endpoint recognition, and more.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"lsrtunnel": {
"version": "0.2-4",
"description": "Spoofs connections using source routed packets.",
"dependencies": [
"libpcap",
"libdnet"
]
},
"lte-cell-scanner": {
"version": "1:26.e7f71cb-1",
"description": "An OpenCL accelerated TDD/FDD LTE Scanner.",
"dependencies": [
"git"
]
},
"lte-cell-scanner-debug": {
"version": "1:26.e7f71cb-1",
"description": "Detached debugging symbols for lte-cell-scanner",
"dependencies": []
},
"luksipc": {
"version": "0.01-1",
"description": "A tool to convert unencrypted block devices to encrypted LUKS devices in-place.",
"dependencies": []
},
"lulzbuster": {
"version": "1.3.2-3",
"description": "A very fast and smart web directory and file enumeration tool written in C.",
"dependencies": [
"curl"
]
},
"lunar": {
"version": "884.0578751-1",
"description": "A UNIX security auditing tool based on several security frameworks.",
"dependencies": [
"bash",
"netkit-bsd-finger",
"bc"
]
},
"luyten": {
"version": "0.5.4-1",
"description": "An Open Source Java Decompiler Gui for Procyon.",
"dependencies": [
"java-environment"
]
},
"lyricpass": {
"version": "45.fd31d07-5",
"description": "Tool to generate wordlists based on lyrics.",
"dependencies": [
"python",
"python-requests"
]
},
"m3-gen": {
"version": "7.7c656cc-4",
"description": "Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose.",
"dependencies": [
"python2"
]
},
"machinae": {
"version": "197.9ef3e6c-4",
"description": "A tool for collecting intelligence from public sites/feeds about various security-related pieces of data.",
"dependencies": [
"python",
"python-dateutil",
"python-requests",
"python-yaml",
"python-magic",
"python-stopit",
"python-feedparser",
"python-ipwhois",
"python-pytz",
"python-beautifulsoup4",
"python-tzlocal",
"python-filemagic",
"python-relatime",
"python-html5lib",
"python-defang",
"python-dnspython"
]
},
"maclookup": {
"version": "1:0.4-2",
"description": "Lookup MAC addresses in the IEEE MA-L/OUI public listing.",
"dependencies": []
},
"mac-robber": {
"version": "1.02-1",
"description": "A digital investigation tool that collects data from allocated files in a mounted file system.",
"dependencies": []
},
"magescan": {
"version": "1.12.9-1",
"description": "Scan a Magento site for information.",
"dependencies": [
"php"
]
},
"magicrescue": {
"version": "1.1.9-4",
"description": "Find and recover deleted files on block devices",
"dependencies": []
},
"magictree": {
"version": "1.3-9",
"description": "A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation",
"dependencies": [
"java-environment",
"screen"
]
},
"maigret": {
"version": "1:main.r46.gb90cdb1-1",
"description": "OSINT username checker. Collect a dossier on a person by username from a huge number of sites.",
"dependencies": [
"python",
"python-aiohttp",
"python-aiohttp-socks",
"python-aiodns",
"python-arabic-reshaper",
"python-async-timeout",
"python-attrs",
"python-beautifulsoup4",
"python-certifi",
"python-chardet",
"python-colorama",
"python-dateutil",
"python-future",
"python-idna",
"python-future-annotations",
"python-html5lib",
"python-jinja",
"python-lxml",
"python-markupsafe",
"python-mock",
"python-multidict",
"python-pycountry",
"python-pypdf2",
"python-pysocks",
"python-networkx",
"python-python-bidi",
"python-requests",
"python-requests-futures",
"python-six",
"python-socid-extractor",
"python-soupsieve",
"python-stem",
"python-torrequest",
"python-tqdm",
"python-typing_extensions",
"python-webencodings",
"python-xhtml2pdf",
"python-xmind",
"python-yarl",
"python-tokenize-rt",
"python-cloudscraper",
"python-alive-progress"
]
},
"mail-crawl": {
"version": "0.1-3",
"description": "Tool to harvest emails from website.",
"dependencies": [
"python2"
]
},
"mailsend-go": {
"version": "118.902fe39-1",
"description": "A multi-platform command line tool to send mail via SMTP protocol.",
"dependencies": [
"glibc"
]
},
"mailsend-go-debug": {
"version": "118.902fe39-1",
"description": "Detached debugging symbols for mailsend-go",
"dependencies": []
},
"make-pdf": {
"version": "0.1.7-4",
"description": "This tool will embed javascript inside a PDF document.",
"dependencies": [
"python2",
"dos2unix"
]
},
"maketh": {
"version": "0.2.0-3",
"description": "A packet generator that supports forging ARP, IP, TCP, UDP, ICMP and the ethernet header as well.",
"dependencies": []
},
"malboxes": {
"version": "449.f9f310e-7",
"description": "Builds malware analysis Windows VMs so that you don't have to.",
"dependencies": [
"python",
"packer",
"virtualbox",
"vagrant",
"python-jsmin",
"python-jinja"
]
},
"malcom": {
"version": "708.02e55b9-6",
"description": "Analyze a system's network communication using graphical representations of network traffic.",
"dependencies": [
"python2",
"python2-virtualenv",
"python2-typing"
]
},
"malheur": {
"version": "0.5.4-2",
"description": "A tool for the automatic analyze of malware behavior.",
"dependencies": [
"libconfig>=1.4",
"libarchive>=2.70"
]
},
"malice": {
"version": "0.3.28-2",
"description": "VirusTotal Wanna Be - Now with 100% more Hipster.",
"dependencies": []
},
"malicious-pdf": {
"version": "48.412eca7-1",
"description": "Generate a bunch of malicious pdf files with phone-home functionality.",
"dependencies": [
"python"
]
},
"maligno": {
"version": "2.5-6",
"description": "An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS.",
"dependencies": [
"python2",
"python2-lxml",
"python2-pycryptodome",
"metasploit",
"python2-ipcalc"
]
},
"mallory": {
"version": "134.47094fb-2",
"description": "HTTP/HTTPS proxy over SSH.",
"dependencies": []
},
"malmon": {
"version": "0.3-5",
"description": "Hosting exploit/backdoor detection daemon.",
"dependencies": [
"python2",
"python2-pyinotify"
]
},
"malscan": {
"version": "5.773505a-3",
"description": "A Simple PE File Heuristics Scanner.",
"dependencies": [
"python2",
"python2-pefile"
]
},
"maltego": {
"version": "4.9.1-1",
"description": "An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.",
"dependencies": [
"java-environment=11",
"giflib"
]
},
"maltego-debug": {
"version": "4.9.1-1",
"description": "Detached debugging symbols for maltego",
"dependencies": []
},
"maltrail": {
"version": "117492.d86349b52b-1",
"description": "Malicious traffic detection system.",
"dependencies": [
"python",
"python-pcapy",
"python-pysqlite3"
]
},
"maltrieve": {
"version": "342.b9e7560-2",
"description": "Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.",
"dependencies": [
"python2-beautifulsoup4",
"python2-lxml",
"python2-feedparser",
"python2-gevent",
"python2-greenlet",
"python2-grequests",
"python2-requests",
"python2-wsgiref"
]
},
"malwareanalyser": {
"version": "3.3-5",
"description": "A freeware tool to perform static and dynamic analysis on malware.",
"dependencies": []
},
"malware-check-tool": {
"version": "1.2-5",
"description": "Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.",
"dependencies": [
"python2"
]
},
"malwaredetect": {
"version": "0.1-4",
"description": "Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware",
"dependencies": []
},
"malwasm": {
"version": "0.2-4",
"description": "Offline debugger for malware's reverse engineering.",
"dependencies": []
},
"malybuzz": {
"version": "1.0-4",
"description": "A Python tool focused in discovering programming faults in network software.",
"dependencies": [
"python2",
"python2-lxml"
]
},
"mana": {
"version": "68.56bcfcd-1",
"description": "A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.",
"dependencies": []
},
"mando.me": {
"version": "9.8b34f1a-10",
"description": "Web Command Injection Tool.",
"dependencies": [
"python",
"python-dateutil"
]
},
"manspider": {
"version": "70.30ce682-4",
"description": "Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!",
"dependencies": [
"python",
"python-pipx"
]
},
"manticore": {
"version": "0.3.7.r73.g88610053-5",
"description": "Symbolic execution tool.",
"dependencies": [
"python",
"python-yaml",
"python-protobuf",
"python-pysha3",
"python-cbor2",
"python-prettytable",
"python-ply",
"python-rlp",
"python-intervaltree",
"python-crytic-compile",
"python-wasm",
"python-dataclasses",
"python-pyevmasm",
"python-z3-solver",
"python-capstone",
"python-unicorn",
"python-pyelftools",
"python-redis"
]
},
"mantra": {
"version": "1:v2.0.r18.g10b3e8f-1",
"description": "Hunt down API key leaks in JS files and pages.",
"dependencies": []
},
"mantra-debug": {
"version": "1:v2.0.r18.g10b3e8f-1",
"description": "Detached debugging symbols for mantra",
"dependencies": []
},
"manul": {
"version": "197.f525df9-8",
"description": "A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS.",
"dependencies": [
"python",
"python-psutil"
]
},
"manul-debug": {
"version": "197.f525df9-8",
"description": "Detached debugging symbols for manul",
"dependencies": []
},
"mapcidr-debug": {
"version": "v1.1.34.r391.g873f5b8-1",
"description": "Detached debugging symbols for mapcidr",
"dependencies": []
},
"mapcidr": {
"version": "v1.1.34.r391.g873f5b8-1",
"description": "Utility program to perform multiple operations for a given subnet/CIDR ranges.",
"dependencies": []
},
"mara-framework": {
"version": "176.ac4ac88-3",
"description": "A Mobile Application Reverse engineering and Analysis Framework.",
"dependencies": [
"bash",
"tree",
"git",
"gtk2",
"python2",
"python3",
"java-environment",
"figlet",
"python2-pydot"
]
},
"mara-framework-debug": {
"version": "176.ac4ac88-3",
"description": "Detached debugging symbols for mara-framework",
"dependencies": []
},
"marc4dasm": {
"version": "6.f11860f-5",
"description": "A disassembler for the Atmel MARC4 (a 4 bit Harvard micro).",
"dependencies": [
"python2"
]
},
"marshalsec": {
"version": "10.2dc4018-1",
"description": "Java Unmarshaller Security - Turning your data into code execution.",
"dependencies": [
"java-runtime"
]
},
"maryam": {
"version": "2:819.99ae85a-1",
"description": "Full-featured Web Identification framework written in Python.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-lxml",
"python-cloudscraper",
"python-flask"
]
},
"maskprocessor": {
"version": "0.73-1",
"description": "A High-Performance word generator with a per-position configurable charset.",
"dependencies": []
},
"massbleed": {
"version": "20.44b7e85-5",
"description": "SSL Vulnerability Scanner.",
"dependencies": [
"unicornscan",
"nmap",
"python",
"sslscan",
"bash",
"testssl.sh"
]
},
"masscan-automation": {
"version": "26.a170abc-3",
"description": "Masscan integrated with Shodan API.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-shodan",
"python2-requests",
"masscan"
]
},
"massdns": {
"version": "309.cb49ad2-1",
"description": "A high-performance DNS stub resolver in C.",
"dependencies": [
"libpcap",
"ldns"
]
},
"massdns-debug": {
"version": "309.cb49ad2-1",
"description": "Detached debugging symbols for massdns",
"dependencies": []
},
"massexpconsole": {
"version": "1:v2.3.5.r1.g530c880-6",
"description": "A collection of tools and exploits with a cli ui for mass exploitation.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-psutil",
"python-pyopenssl",
"python-html5lib",
"python-docopt",
"python-tqdm",
"python-prompt_toolkit"
]
},
"mat": {
"version": "0.6.1-7",
"description": "Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.",
"dependencies": [
"python2",
"python2-distutils-extra",
"python2-pdfrw",
"python2-poppler",
"python2-cairo",
"hachoir-core",
"hachoir-parser",
"python2-mutagen"
]
},
"matahari": {
"version": "0.1.30-4",
"description": "A reverse HTTP shell to execute commands on remote machines behind firewalls.",
"dependencies": [
"python2"
]
},
"matroschka": {
"version": "58.2f026a4-4",
"description": "Python steganography tool to hide images or text in images.",
"dependencies": [
"python2",
"python2-pillow6"
]
},
"mausezahn": {
"version": "0.40-3",
"description": "A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.",
"dependencies": []
},
"mbelib": {
"version": "1.3.0-1",
"description": "Voice codecs for P25, ProVoice, Half Rate",
"dependencies": [
"glibc"
]
},
"mbenum": {
"version": "1.5.0-5",
"description": "Queries the master browser for whatever information it has registered.",
"dependencies": []
},
"mboxgrep": {
"version": "0.7.9-5",
"description": "A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.",
"dependencies": []
},
"mdbtools": {
"version": "738.823b32f-1",
"description": "Utilities for viewing data and exporting schema from Microsoft Access Database files.",
"dependencies": []
},
"mdcrack": {
"version": "1.2-7",
"description": "MD4/MD5/NTLM1 hash cracker",
"dependencies": []
},
"mdk3-debug": {
"version": "v6-10",
"description": "Detached debugging symbols for mdk3",
"dependencies": []
},
"mdk3": {
"version": "v6-10",
"description": "WLAN penetration tool.",
"dependencies": [
"glibc",
"aircrack-ng"
]
},
"mdns-recon": {
"version": "11.69b864e-3",
"description": "An mDNS recon tool written in Python.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"mdns-scan": {
"version": "0.5-5",
"description": "Scan mDNS/DNS-SD published services on the local network",
"dependencies": [
"glibc"
]
},
"meanalyzer": {
"version": "1.273.0-6",
"description": "Intel Engine Firmware Analysis Tool.",
"dependencies": [
"python",
"python-colorama",
"python-crccheck",
"python-ptable-boxchar",
"python-prettytable"
]
},
"meg": {
"version": "87.9daab00-2",
"description": "Fetch many paths for many hosts - without killing the hosts.",
"dependencies": []
},
"melkor": {
"version": "1.0-2",
"description": "An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).",
"dependencies": [
"java-environment"
]
},
"memdump": {
"version": "1.01-7",
"description": "Dumps system memory to stdout, skipping over holes in memory maps.",
"dependencies": []
},
"memfetch": {
"version": "0.05b-4",
"description": "Dumps any userspace process memory without affecting its execution.",
"dependencies": []
},
"memimager": {
"version": "1.0-1",
"description": "Performs a memory dump using NtSystemDebugControl.",
"dependencies": []
},
"mentalist": {
"version": "6.953a07b-14",
"description": "Graphical tool for custom wordlist generation.",
"dependencies": [
"python",
"tk"
]
},
"merlin-server": {
"version": "1.3.0-1",
"description": "Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.",
"dependencies": []
},
"metabigor": {
"version": "78.607b2c9-1",
"description": "Intelligence Tool but without API key.",
"dependencies": [
"nmap",
"masscan",
"zmap"
]
},
"metabigor-debug": {
"version": "78.607b2c9-1",
"description": "Detached debugging symbols for metabigor",
"dependencies": []
},
"metacoretex": {
"version": "0.8.0-4",
"description": "MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.",
"dependencies": [
"java-environment"
]
},
"metafinder": {
"version": "v1.2.r2.g30c8475-5",
"description": "Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata.",
"dependencies": [
"python",
"python-requests",
"python-pikepdf",
"python-beautifulsoup4",
"python-openpyxl",
"python-python-docx",
"python-python-pptx",
"python-urllib3",
"python-prompt_toolkit"
]
},
"metaforge": {
"version": "115.7b32693-8",
"description": "Auto Scanning to SSL Vulnerability.",
"dependencies": [
"python",
"python-colorama",
"python-progress",
"python-dominate",
"python-pyexifinfo",
"perl-image-exiftool"
]
},
"metagoofil": {
"version": "87.b232cb4-1",
"description": "An information gathering tool designed for extracting metadata of public documents.",
"dependencies": [
"python",
"python-requests",
"python-google"
]
},
"metame": {
"version": "14.8d583a0-9",
"description": "A simple metamorphic code engine for arbitrary executables.",
"dependencies": [
"python",
"python-simplejson",
"python-keystone",
"python-r2pipe",
"radare2"
]
},
"metasploit-autopwn": {
"version": "12.09320cc-1",
"description": "db_autopwn plugin of metasploit.",
"dependencies": [
"metasploit"
]
},
"meterssh": {
"version": "18.9a5ed19-3",
"description": "A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.",
"dependencies": [
"python2",
"metasploit"
]
},
"metoscan": {
"version": "05-3",
"description": "Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.",
"dependencies": []
},
"mfcuk": {
"version": "0.3.8-9",
"description": "MIFARE Classic Universal toolKit.",
"dependencies": [
"libnfc>=1.7.0"
]
},
"mfsniffer": {
"version": "0.1-5",
"description": "A python script for capturing unencrypted TSO login credentials.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"mft2csv": {
"version": "40.164eb224-2",
"description": "Extract $MFT record info and log it to a csv file.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"mftcarver": {
"version": "9.7bfcc0a2-1",
"description": "Carve $MFT records from a chunk of data (for instance a memory dump).",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"mftrcrd": {
"version": "16.35c3ac2f-1",
"description": "Command line $MFT record decoder.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"mftref2name": {
"version": "6.7df9eebb-1",
"description": "Resolve file index number to name or vice versa on NTFS.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"miasm-git-debug": {
"version": "0.1.5.dev47-1",
"description": "Detached debugging symbols for miasm-git",
"dependencies": []
},
"mibble": {
"version": "2.10.1-1",
"description": "An open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.",
"dependencies": [
"java-environment",
"bash"
]
},
"microsploit": {
"version": "9.441e132-1",
"description": "Fast and easy create backdoor office exploitation using module metasploit packet, Microsoft Office, Open Office, Macro attack, Buffer Overflow.",
"dependencies": []
},
"middler": {
"version": "1.0-4",
"description": "A Man in the Middle tool to demonstrate protocol middling attacks.",
"dependencies": []
},
"mikrotik-npk": {
"version": "11.d54e97c-4",
"description": "Python tools for manipulating Mikrotik NPK format.",
"dependencies": [
"python2"
]
},
"mildew": {
"version": "11.df49c23-1",
"description": "Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs.",
"dependencies": []
},
"mimikatz": {
"version": "2.2.0_20220919-1",
"description": "A little tool to play with Windows security.",
"dependencies": []
},
"mimipenguin": {
"version": "152.880a427-5",
"description": "A tool to dump the login password from the current linux user.",
"dependencies": [
"python"
]
},
"mimipenguin-debug": {
"version": "152.880a427-5",
"description": "Detached debugging symbols for mimipenguin",
"dependencies": []
},
"mingsweeper": {
"version": "1.00-2",
"description": "A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification.",
"dependencies": []
},
"minimodem": {
"version": "353.bb2f34c-2",
"description": "A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols.",
"dependencies": [
"alsa-lib",
"libpulse",
"fftw",
"sndio"
]
},
"minimysqlator": {
"version": "0.5-5",
"description": "A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.",
"dependencies": [
"java-environment"
]
},
"miranda-upnp": {
"version": "1.3-8",
"description": "A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices",
"dependencies": []
},
"missidentify": {
"version": "1.0-5",
"description": "A program to find Win32 applications.",
"dependencies": []
},
"missionplanner": {
"version": "1.3.82-1",
"description": "A GroundControl Station for Ardupilot.",
"dependencies": [
"mono"
]
},
"mitm6": {
"version": "33.8e75884-6",
"description": "Pwning IPv4 via IPv6.",
"dependencies": [
"python",
"scapy",
"python-twisted",
"python-netifaces"
]
},
"mitm": {
"version": "8.bd2b351-7",
"description": "A simple yet effective python3 script to perform DNS spoofing via ARP poisoning.",
"dependencies": [
"python",
"scapy",
"python-netifaces",
"python-python-nmap"
]
},
"mitmap": {
"version": "89.b590f9a-8",
"description": "A python program to create a fake AP and sniff data.",
"dependencies": [
"python",
"python-dnspython",
"python-pcapy",
"python-twisted",
"sslstrip"
]
},
"mitmap-old": {
"version": "1:0.1-3",
"description": "Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.",
"dependencies": [
"bash",
"aircrack-ng",
"ettercap",
"iptables",
"dhcp"
]
},
"mitmer": {
"version": "22.b01c7fe-5",
"description": "A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.",
"dependencies": [
"python2",
"python2-scapy",
"python2-nfqueue"
]
},
"mitmf": {
"version": "467.0458300-6",
"description": "A Framework for Man-In-The-Middle attacks written in Python.",
"dependencies": [
"python2-configobj",
"python2-pillow6",
"python2-user-agents",
"python2-twistedx",
"python2-netfilterqueue",
"python2-msgpack",
"python2-requests",
"python2-scapy",
"capstone",
"python2-pefile",
"python2-dnspython",
"systemd",
"backdoor-factory",
"python2-pyinotify",
"python2-beautifulsoup4",
"python2-magic",
"python2-dnslib",
"python2-netaddr",
"python2-flask",
"python2-ipy",
"python2-pyopenssl",
"python2-setuptools"
]
},
"mitm-relay": {
"version": "40.1b74741-6",
"description": "Hackish way to intercept and modify non-HTTP protocols through Burp & others.",
"dependencies": [
"python",
"python-requests"
]
},
"mkbrutus": {
"version": "27.ddd5f8e-5",
"description": "Password bruteforcer for MikroTik devices or boxes running RouterOS.",
"dependencies": [
"python3"
]
},
"mkinitcpio-openswap": {
"version": "0.1.0-1",
"description": "A mkinitcpio hook to open swap at boot time.",
"dependencies": [
"mkinitcpio"
]
},
"mkyara": {
"version": "3.8147f91-9",
"description": "Tool to generate YARA rules based on binary code.",
"dependencies": [
"python",
"python-capstone",
"python-yara-python-dex",
"python-argparse"
]
},
"mobiusft": {
"version": "1.12-1",
"description": "An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.",
"dependencies": [
"python2",
"python2-lxml",
"pygtk",
"python2-cairo",
"sleuthkit"
]
},
"mobsf": {
"version": "2:v4.3.0.r2.gae34f7c-1",
"description": "An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.",
"dependencies": [
"python"
]
},
"mobsf-debug": {
"version": "2:v4.3.0.r2.gae34f7c-1",
"description": "Detached debugging symbols for mobsf",
"dependencies": []
},
"modifycerttemplate": {
"version": "7.4c35708-5",
"description": "Aid operators in modifying ADCS certificate templates so that a created vulnerable state can be leveraged for privilege escalation.",
"dependencies": [
"python",
"python-ldap3",
"impacket"
]
},
"modlishka-debug": {
"version": "v.1.1.0.r60.g3ebc29e-1",
"description": "Detached debugging symbols for modlishka",
"dependencies": []
},
"modlishka": {
"version": "v.1.1.0.r60.g3ebc29e-1",
"description": "A powerful and flexible HTTP reverse proxy.",
"dependencies": []
},
"modscan": {
"version": "0.1-6",
"description": "A new tool designed to map a SCADA MODBUS TCP based network.",
"dependencies": [
"python2",
"python2-ipy"
]
},
"moloch": {
"version": "0.11.3-1",
"description": "An open source large scale IPv4 full PCAP capturing, indexing and database system.",
"dependencies": [
"curl",
"file",
"util-linux",
"perl-json",
"perl-libwww",
"libpng",
"python2",
"elasticsearch",
"geoip",
"libnids",
"nodejs"
]
},
"mongoaudit": {
"version": "222.70b83e8-9",
"description": "A powerful MongoDB auditing and pentesting tool .",
"dependencies": [
"python",
"python-pymongo",
"python-urwid",
"python-setuptools",
"python-dnspython"
]
},
"mongodb": {
"version": "6.0.4-1",
"description": "A high-performance, open source, schema-free document-oriented database.",
"dependencies": [
"libstemmer",
"snappy",
"boost-libs",
"pcre",
"yaml-cpp",
"curl"
]
},
"monocle": {
"version": "1.0-5",
"description": "A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.",
"dependencies": []
},
"monsoon": {
"version": "261.f4f9852-2",
"description": "A fast HTTP enumerator that allows you to execute a large number of HTTP requests.",
"dependencies": []
},
"moonwalk-debug": {
"version": "v1.0.0.r18.g68d5be1-1",
"description": "Detached debugging symbols for moonwalk",
"dependencies": []
},
"moonwalk": {
"version": "v1.0.0.r18.g68d5be1-1",
"description": "Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.",
"dependencies": []
},
"mooscan": {
"version": "1:10.82963b0-4",
"description": "A scanner for Moodle LMS.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-pytest",
"python-gitpython",
"python-yaml",
"python-urllib3",
"python-sqlalchemy"
]
},
"morbid": {
"version": "0.8.7.3-6",
"description": "A Twisted-based publish/subscribe messaging server that uses the STOMP protocol.",
"dependencies": [
"python2"
]
},
"morpheus": {
"version": "165.5d81c9e-1",
"description": "Automated Ettercap TCP/IP Hijacking Tool.",
"dependencies": [
"bash",
"xterm",
"zenity",
"ettercap",
"dsniff",
"apache",
"nmap",
"driftnet",
"sudo",
"metasploit"
]
},
"morxbook": {
"version": "1.0-7",
"description": "A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.",
"dependencies": [
"perl",
"perl-net-ssleay"
]
},
"morxbrute": {
"version": "1.01-9",
"description": "A customizable HTTP dictionary-based password cracking tool written in Perl.",
"dependencies": [
"perl"
]
},
"morxbtcrack": {
"version": "1.0-4",
"description": "Single Bitcoin private key cracking tool released.",
"dependencies": [
"bash",
"morxkeyfmt"
]
},
"morxcoinpwn": {
"version": "1.0-3",
"description": "Mass Bitcoin private keys brute forcing/Take over tool released.",
"dependencies": [
"bash",
"morxkeyfmt",
"bitcoin-daemon"
]
},
"morxcrack": {
"version": "1.2-2",
"description": "A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.",
"dependencies": []
},
"morxkeyfmt": {
"version": "1.0-1",
"description": "Read a private key from stdin and output formatted data values.",
"dependencies": []
},
"morxtraversal": {
"version": "1.0-6",
"description": "Path Traversal checking tool.",
"dependencies": [
"perl",
"perl-io-socket"
]
},
"morxtunel": {
"version": "1.0-3",
"description": "Network Tunneling using TUN/TAP interfaces over TCP tool.",
"dependencies": []
},
"mosca": {
"version": "130.a7e725d-1",
"description": "Static analysis tool to find bugs like a grep unix command.",
"dependencies": [
"pcre"
]
},
"mosca-debug": {
"version": "130.a7e725d-1",
"description": "Detached debugging symbols for mosca",
"dependencies": []
},
"mosquito": {
"version": "39.fe54831-3",
"description": "XSS exploitation tool - access victims through HTTP proxy.",
"dependencies": [
"python2",
"python2-simplejson",
"python2-lxml",
"python2-urwid",
"python2-pyopenssl",
"python2-pyasn1",
"python2-pyasn1-modules",
"python2-flask",
"python2-jsbeautifier"
]
},
"mots": {
"version": "5.34017ca-6",
"description": "Man on the Side Attack - experimental packet injection and detection.",
"dependencies": [
"python2",
"python2-netifaces",
"python2-scapy"
]
},
"motsa-dns-spoofing": {
"version": "2.6ac6980-5",
"description": "ManOnTheSideAttack-DNS Spoofing.",
"dependencies": [
"python2",
"python2-scapy",
"python2"
]
},
"mousejack": {
"version": "5.58b69c1-4",
"description": "Wireless mouse/keyboard attack with replay/transmit poc.",
"dependencies": [
"python2",
"python2-pyusb"
]
},
"mp3nema": {
"version": "0.4-3",
"description": "A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as \"out of band\" data.",
"dependencies": [
"glibc"
]
},
"mptcp": {
"version": "1.9.0-2",
"description": "A tool for manipulation of raw packets that allows a large number of options.",
"dependencies": [
"libpcap"
]
},
"mptcp-abuse": {
"version": "6.b0eeb27-4",
"description": "A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.",
"dependencies": [
"python2"
]
},
"mqtt-pwn": {
"version": "43.40368e5-7",
"description": "A one-stop-shop for IoT Broker penetration-testing and security assessment operations.",
"dependencies": [
"python",
"python-blessings",
"python-peewee",
"python-pygments",
"python-shodan",
"python-cmd2",
"python-paho-mqtt",
"python-prettytable"
]
},
"mrkaplan": {
"version": "1:1.1.1-1",
"description": "Help red teamers to stay hidden by clearing evidence of execution.",
"dependencies": []
},
"mrsip": {
"version": "110.bdd98ad-1",
"description": "SIP-Based Audit and Attack Tool.",
"dependencies": [
"python2",
"python2-scapy",
"toilet",
"python2-netifaces",
"python2-pyfiglet",
"python2-ipaddress"
]
},
"mrtparse": {
"version": "522.13cde30-3",
"description": "A module to read and analyze the MRT format data.",
"dependencies": [
"python2",
"python2-setuptools"
]
},
"msfdb": {
"version": "16.09c603b-1",
"description": "Manage the metasploit framework database.",
"dependencies": [
"metasploit",
"postgresql",
"postgresql-libs",
"openssl",
"lsof",
"sed"
]
},
"msfenum": {
"version": "36.6c6b77e-3",
"description": "A Metasploit auto auxiliary script.",
"dependencies": [
"python2",
"python2-argparse"
]
},
"msf-mpc": {
"version": "35.8007ef2-1",
"description": "Msfvenom payload creator.",
"dependencies": [
"metasploit"
]
},
"msmailprobe": {
"version": "1.c01c8bf-1",
"description": "Office 365 and Exchange Enumeration tool.",
"dependencies": [
"glibc"
]
},
"mssqlrelay": {
"version": "11.bd764b9-2",
"description": "Microsoft SQL Relay is an offensive tool for auditing and abusing Microsoft SQL (MSSQL) services.",
"dependencies": [
"python",
"impacket-ba",
"python-asn1crypto",
"python-cryptography",
"python-ldap3",
"python-pyasn1",
"python-dnspython",
"python-dsinternals",
"python-pyopenssl",
"python-requests",
"python-requests-ntlm"
]
},
"mssqlscan": {
"version": "0.8.4-3",
"description": "A small multi-threaded tool that scans for Microsoft SQL Servers.",
"dependencies": [
"java-environment"
]
},
"ms-sys": {
"version": "2.8.0-1",
"description": "A tool to write Win9x- master boot records (mbr) under linux - RTM!",
"dependencies": []
},
"ms-sys-debug": {
"version": "2.8.0-1",
"description": "Detached debugging symbols for ms-sys",
"dependencies": []
},
"msvpwn": {
"version": "1:65.328921b-1",
"description": "Bypass Windows' authentication via binary patching.",
"dependencies": []
},
"mtscan": {
"version": "167.099482e-1",
"description": "Mikrotik RouterOS wireless scanner.",
"dependencies": [
"libpcap",
"openssl",
"gtk2",
"zlib",
"yajl",
"libssh"
]
},
"mtscan-debug": {
"version": "167.099482e-1",
"description": "Detached debugging symbols for mtscan",
"dependencies": []
},
"mubeng": {
"version": "254.a77f2d5-1",
"description": "An incredibly fast proxy checker & IP rotator with ease.",
"dependencies": []
},
"mubeng-debug": {
"version": "254.a77f2d5-1",
"description": "Detached debugging symbols for mubeng",
"dependencies": []
},
"mugshot": {
"version": "0.4.3-6",
"description": "Program to update personal user details.",
"dependencies": [
"gtk3",
"python-pexpect",
"python-dbus",
"python-cairo",
"python-gobject",
"accountsservice"
]
},
"multiinjector": {
"version": "0.4-3",
"description": "Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.",
"dependencies": [
"python2",
"python2-pycurl"
]
},
"multimac": {
"version": "1.0.3-3",
"description": "Multiple MACs on an adapter",
"dependencies": []
},
"multiscanner": {
"version": "1559.86e0145-2",
"description": "Modular file scanning/analysis framework.",
"dependencies": [
"python2",
"python2-requests",
"python2-magic",
"python2-flask",
"python2-configparser",
"python2-bitstring",
"python2-paramiko",
"python2-pefile",
"python2-ssdeep",
"python2-sqlalchemy",
"python2-sqlalchemy-utils",
"python2-pymongo",
"python2-pyclamd",
"python2-elasticsearch"
]
},
"multitun": {
"version": "1:1.319a134-2",
"description": "Tunnel arbitrary traffic through an innocuous WebSocket.",
"dependencies": [
"python2",
"python2-twistedx",
"python2-iniparse",
"python2-autobahn",
"python2-python-pytun",
"python2-pycryptodome",
"python2-dpkt",
"python2-cryptography",
"python2-streql",
"python2-typing"
]
},
"munin-hashchecker": {
"version": "239.95b046d-4",
"description": "Online hash checker for Virustotal and other services",
"dependencies": [
"python",
"python-colorama",
"python-future",
"python-requests",
"python-pymisp",
"python-flask",
"python-flask-caching",
"python-cfscrape",
"python-pycurl",
"python-dnspython",
"python-ipy"
]
},
"muraena": {
"version": "230.9a535ba-1",
"description": "Almost-transparent reverse proxy to automate phishing and post-phishing activities.",
"dependencies": []
},
"muraena-debug": {
"version": "230.9a535ba-1",
"description": "Detached debugging symbols for muraena",
"dependencies": []
},
"mutator": {
"version": "51.164132d-1",
"description": "This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012",
"dependencies": []
},
"mwebfp": {
"version": "16.a800b98-9",
"description": "Mass Web Fingerprinter.",
"dependencies": [
"cutycapt",
"python2-requests",
"python2-python-nmap",
"nmap"
]
},
"mxtract": {
"version": "90.0b34376-1",
"description": "Memory Extractor & Analyzer.",
"dependencies": []
},
"mybff": {
"version": "98.094d443-3",
"description": "A Brute Force Framework.",
"dependencies": [
"python2",
"python2-requests",
"python2-lxml",
"python2-selenium",
"python2-beautifulsoup4"
]
},
"myjwt": {
"version": "202.719b939-5",
"description": "This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject, etc.",
"dependencies": [
"python",
"python-click",
"python-cryptography",
"python-pyopenssl",
"python-requests",
"python-questionary",
"python-aiocmd",
"exrex",
"python-pyperclip"
]
},
"mylg": {
"version": "659.faba867-2",
"description": "Network Diagnostic Tool.",
"dependencies": [
"libpcap"
]
},
"myrescue": {
"version": "0.9.8-1",
"description": "A hard disk recovery tool that reads undamaged regions first.",
"dependencies": []
},
"myrescue-debug": {
"version": "0.9.8-1",
"description": "Detached debugging symbols for myrescue",
"dependencies": []
},
"mysql2sqlite": {
"version": "1:14.e5b2c31-1",
"description": "Converts a mysqldump file into a Sqlite 3 compatible file.",
"dependencies": []
},
"mysql-python": {
"version": "1.2.5-7",
"description": "MySQL support for Python.",
"dependencies": [
"python2",
"mariadb-libs"
]
},
"mysql-python-debug": {
"version": "1.2.5-7",
"description": "Detached debugging symbols for mysql-python",
"dependencies": []
},
"n1qlmap": {
"version": "2.5365444-7",
"description": "An N1QL exploitation tool.",
"dependencies": [
"python",
"python-requests"
]
},
"naabu": {
"version": "1631.8043530-1",
"description": "A fast port scanner written in go with focus on reliability and simplicity.",
"dependencies": []
},
"naabu-debug": {
"version": "1631.8043530-1",
"description": "Detached debugging symbols for naabu",
"dependencies": []
},
"nacker": {
"version": "23.b67bb39-5",
"description": "A tool to circumvent 802.1x Network Access Control on a wired LAN.",
"dependencies": [
"python2",
"python2-netifaces",
"python2-netaddr",
"python2-scapy"
]
},
"naft": {
"version": "0.0.9-4",
"description": "Network Appliance Forensic Toolkit.",
"dependencies": [
"python2",
"python2-yara"
]
},
"narthex": {
"version": "v1.2.r7.g8b78746-1",
"description": "Modular personalized dictionary generator.",
"dependencies": [
"glibc"
]
},
"nasnum": {
"version": "5.df5df19-2",
"description": "Script to enumerate network attached storages.",
"dependencies": [
"bash",
"smbclient",
"ncftp",
"nfs-utils",
"net-snmp"
]
},
"navgix": {
"version": "3.6f25c98-1",
"description": "Multi-threaded golang tool that will check for nginx alias traversal vulnerabilities.",
"dependencies": []
},
"navgix-debug": {
"version": "3.6f25c98-1",
"description": "Detached debugging symbols for navgix",
"dependencies": []
},
"nbname": {
"version": "1.0-3",
"description": "Decodes and displays all NetBIOS name packets it receives on UDP port 137 and more!",
"dependencies": []
},
"nbnspoof": {
"version": "1.0-9",
"description": "NetBIOS Name Service Spoofer.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"nbtenum": {
"version": "3.3-7",
"description": "A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.",
"dependencies": []
},
"nbtool": {
"version": "1:2.bf90c76-1",
"description": "Some tools for NetBIOS and DNS investigation, attacks, and communication.",
"dependencies": []
},
"ncp": {
"version": "1.2.4-4",
"description": "A fast file copy tool for LANs",
"dependencies": []
},
"ncpfs": {
"version": "2.2.6-11",
"description": "Allows you to mount volumes of NetWare servers under Linux.",
"dependencies": []
},
"ncurses5-compat-libs": {
"version": "6.1-3",
"description": "System V Release 4.0 curses emulation library, ABI 5.",
"dependencies": [
"glibc",
"gcc-libs",
"sh"
]
},
"ndpi": {
"version": "1:4.8-1",
"description": "Open and Extensible GPLv3 Deep Packet Inspection Library.",
"dependencies": [
"libpcap"
]
},
"ndpi-debug": {
"version": "1:4.8-1",
"description": "Detached debugging symbols for ndpi",
"dependencies": []
},
"necromant": {
"version": "4.53930c2-3",
"description": "Python Script that search unused Virtual Hosts in Web Servers.",
"dependencies": [
"python2",
"python2-httplib2"
]
},
"needle": {
"version": "579.891b660-3",
"description": "The iOS Security Testing Framework.",
"dependencies": [
"python2",
"python2-pysqlite",
"python2-paramiko",
"python2-pyopenssl",
"python2-frida",
"python2-sshtunnel",
"mitmproxy",
"python2-biplist"
]
},
"neglected": {
"version": "1:8.68d02b3-1",
"description": "Facebook CDN Photo Resolver.",
"dependencies": []
},
"neighbor-cache-fingerprinter": {
"version": "83.f1e596f-3",
"description": "An ARP based Operating System version scanner.",
"dependencies": [
"boost",
"libdnet",
"libpcap"
]
},
"nemesis": {
"version": "331.5aee868-2",
"description": "A command-line network packet crafting and injection utility.",
"dependencies": [
"glibc",
"libnet",
"libpcap"
]
},
"nemesis-debug": {
"version": "331.5aee868-2",
"description": "Detached debugging symbols for nemesis",
"dependencies": []
},
"neo4j-community": {
"version": "5.26.0-1",
"description": "A fully transactional graph database implemented in Java.",
"dependencies": [
"java-runtime=17"
]
},
"neo-regeorg": {
"version": "1:v5.2.1.r0.g05081d1-1",
"description": "Improved version of reGeorg, HTTP tunneling pivot tool",
"dependencies": [
"python",
"python-requests"
]
},
"netactview": {
"version": "0.6.4-7",
"description": "A graphical network connections viewer similar in functionality to netstat.",
"dependencies": [
"libglade",
"libgtop"
]
},
"netattack": {
"version": "2:24.230b856-4",
"description": "Python script to scan and attack wireless networks.",
"dependencies": [
"python2",
"python2-argparse",
"python2-scapy",
"iw",
"wireless_tools"
]
},
"netbios-share-scanner": {
"version": "1.0-2",
"description": "This tool could be used to check windows workstations and servers if they have accessible shared resources.",
"dependencies": [
"python2"
]
},
"netbus": {
"version": "1.6-4",
"description": "NetBus remote administration tool",
"dependencies": []
},
"netcommander": {
"version": "1.3-6",
"description": "An easy-to-use arp spoofing tool.",
"dependencies": [
"python2",
"python2-scapy"
]
},
"netcon": {
"version": "0.1-1",
"description": "A network connection establishment and management script.",
"dependencies": []
},
"net-creds": {
"version": "87.07a25e1-3",
"description": "Sniffs sensitive data from interface or pcap.",
"dependencies": [
"python2",
"python2-wsgiref",
"python2-scapy",
"iproute2",
"net-tools",
"scapy"
]
},
"netdiscover": {
"version": "218.ff28964-1",
"description": "An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.",
"dependencies": [
"libnet",
"libpcap"
]
},
"netexec-pingcastle": {
"version": "9.16340d2-1",
"description": "NetExec & CrackMapExec module that execute PingCastle on a remote machine.",
"dependencies": [
"netexec"
]
},
"netexec": {
"version": "v1.3.0.r354.g307aa248-1",
"description": "A Windows / Active Directory environments pentest tool.",
"dependencies": [
"python",
"python-poetry",
"rust"
]
},
"netkit-bsd-finger": {
"version": "0.17-1",
"description": "BSD-finger ported to Linux.",
"dependencies": [
"glibc"
]
},
"netkit-rusers": {
"version": "0.17-1",
"description": "Logged in users; Displays who is logged in to machines on local network.",
"dependencies": [
"glibc",
"rpcsvc-proto",
"libtirpc-compat"
]
},
"netkit-rwho": {
"version": "0.17-2",
"description": "Remote who client and server (with Debian patches).",
"dependencies": [
"glibc",
"sh"
]
},
"netmap": {
"version": "0.1.3-5",
"description": "Can be used to make a graphical representation of the surrounding network.",
"dependencies": [
"graphviz"
]
},
"netmask": {
"version": "2.4.4-1",
"description": "Helps determine network masks",
"dependencies": []
},
"netreconn": {
"version": "1.78-2",
"description": "A collection of network scan/recon tools that are relatively small compared to their larger cousins.",
"dependencies": [
"perl",
"glibc",
"libpcap"
]
},
"netripper": {
"version": "84.c763bd0-1",
"description": "Smart traffic sniffing for penetration testers.",
"dependencies": []
},
"netscan": {
"version": "1.0-2",
"description": "Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).",
"dependencies": []
},
"netscan2": {
"version": "1:60.3d02ba1-3",
"description": "Active / passive network scanner.",
"dependencies": [
"python2",
"python2-pcapy",
"python2-dpkt",
"mitmproxy",
"python2-nose",
"python2-simplejson",
"python2-requests",
"python2-netaddr",
"python2-awake"
]
},
"netscout": {
"version": "37.2f409df-1",
"description": "OSINT tool that finds domains, subdomains, directories, endpoints and files.",
"dependencies": []
},
"netscout-debug": {
"version": "37.2f409df-1",
"description": "Detached debugging symbols for netscout",
"dependencies": []
},
"netsed": {
"version": "1.3-1",
"description": "Small and handful utility design to alter the contents of packets forwarded thru network in real time.",
"dependencies": [
"glibc"
]
},
"netspionage": {
"version": "99.c24f995-4",
"description": "Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection.",
"dependencies": [
"python",
"python-scapy",
"python-pandas",
"python-pick",
"python-requests",
"python-termcolor"
]
},
"netstumbler": {
"version": "0.4.0-2",
"description": "Well-known wireless AP scanner and sniffer.",
"dependencies": []
},
"nettacker": {
"version": "0.4.0.r58.g65192c8f-1",
"description": "Automated Penetration Testing Framework.",
"dependencies": [
"flake8",
"python-backoff",
"python-argparse",
"python-netaddr",
"python-ipaddr",
"python-requests",
"python-paramiko",
"python-texttable",
"python-pysocks",
"python-win_inet_pton",
"python-pyopenssl",
"python-flask",
"python-lockfile",
"python-bs4",
"python-pyspf",
"python-sqlalchemy",
"canari",
"python-py3dns",
"python-censys",
"python-six",
"python-shodan",
"python-pycurl",
"python-xmltodict",
"scapy",
"python-rule",
"python-mechanize",
"python-psycopg2",
"python-numpy",
"python-terminable-thread",
"python-aiohttp"
]
},
"network-app-stress-tester": {
"version": "19.df75391-2",
"description": "Network Application Stress Testing Yammer.",
"dependencies": []
},
"network-app-stress-tester-debug": {
"version": "19.df75391-2",
"description": "Detached debugging symbols for network-app-stress-tester",
"dependencies": []
},
"networkmap": {
"version": "58.f5faf17-4",
"description": "Post-exploitation network mapper.",
"dependencies": [
"python2",
"python2-decorator",
"python2-networkx",
"python2-pydotplus",
"python2-pyparsing",
"python2-nose",
"python2-ipaddress"
]
},
"networkminer": {
"version": "2.9-1",
"description": "A Network Forensic Analysis Tool for advanced Network Traffic Analysis, sniffer and packet analyzer.",
"dependencies": [
"mono",
"xterm"
]
},
"netzob": {
"version": "1.0.2-12",
"description": "An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.",
"dependencies": [
"python",
"python-gobject",
"gtk3",
"impacket",
"libxml2",
"libxslt",
"python-lxml",
"graphviz",
"python-bitarray",
"python-jsonpickle",
"python-netaddr",
"python-numpy",
"python-colorama",
"python-bintrees",
"python-pcapy",
"python-werkzeug",
"python-pylstar",
"python-mock",
"python-flask",
"python-arpreq"
]
},
"netzob-debug": {
"version": "1.0.2-12",
"description": "Detached debugging symbols for netzob",
"dependencies": []
},
"netz": {
"version": "v0.1.0.r8.g3754e56-1",
"description": "Discover internet-wide misconfigurations while drinking coffee.",
"dependencies": [
"glibc"
]
},
"nexfil": {
"version": "43.4d93c57-1",
"description": "OSINT tool for finding profiles by username.",
"dependencies": [
"python",
"python-aiohttp",
"python-aiodns",
"python-cchardet",
"python-tldextract",
"python-requests"
]
},
"nextnet": {
"version": "3.c8dc7a6-2",
"description": "Pivot point discovery tool.",
"dependencies": []
},
"nfcutils": {
"version": "0.3.2-1",
"description": "Provides a simple 'lsnfc' command that list tags which are in your NFC device field",
"dependencies": []
},
"nfdump": {
"version": "1.6.23-1",
"description": "A set of tools to collect and process netflow data.",
"dependencies": [
"libpcap"
]
},
"nfex": {
"version": "2.5-4",
"description": "A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.",
"dependencies": []
},
"nfspy": {
"version": "1.0-8",
"description": "A Python library for automating the falsification of NFS credentials when mounting an NFS share.",
"dependencies": [
"python2",
"python2-fuse"
]
},
"nfsshell": {
"version": "19980519-6",
"description": "Userland NFS command tool.",
"dependencies": [
"readline",
"libtirpc",
"libtirpc-compat"
]
},
"ngrok": {
"version": "3.2.2-1",
"description": "A tunneling, reverse proxy for developing and understanding networked, HTTP services.",
"dependencies": []
},
"ngrok-debug": {
"version": "3.2.2-1",
"description": "Detached debugging symbols for ngrok",
"dependencies": []
},
"nield": {
"version": "38.0c0848d-1",
"description": "A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.",
"dependencies": []
},
"nili": {
"version": "39.285220a-10",
"description": "Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.",
"dependencies": [
"python",
"python-argparse",
"python-scapy",
"netzob"
]
},
"nimbostratus": {
"version": "54.c7c206f-5",
"description": "Tools for fingerprintinging and exploiting Amazon cloud infrastructures.",
"dependencies": [
"python2",
"python2-nose",
"python2-boto",
"python2-requests",
"python2-httpretty",
"python2-six"
]
},
"nipe": {
"version": "302.9e628df-1",
"description": "A script to make Tor Network your default gateway.",
"dependencies": [
"perl",
"perl-switch",
"perl-json",
"perl-config-simple",
"perl-libwww"
]
},
"nipper": {
"version": "0.11.7-4",
"description": "Network Infrastructure Parser",
"dependencies": []
},
"nirsoft": {
"version": "1.23.30-1",
"description": "Unique collection of small and useful freeware utilities.",
"dependencies": []
},
"nishang": {
"version": "0.7.6-3",
"description": "Using PowerShell for Penetration Testing.",
"dependencies": []
},
"njsscan": {
"version": "0.3.1-7",
"description": "A static application testing (SAST) tool that can find insecure code patterns in your node.js applications.",
"dependencies": [
"python",
"python-libsast",
"python-tabulate",
"python-sarif-om",
"python-jschema-to-python",
"python-pbr",
"python-jsonpickle",
"python-libsast",
"semgrep",
"python-colorama",
"python-ruamel-yaml"
]
},
"nkiller2": {
"version": "2.0-3",
"description": "A TCP exhaustion/stressing tool.",
"dependencies": []
},
"nmap-parse-output": {
"version": "26.a8e31b3-1",
"description": "Converts/manipulates/extracts data from a nmap scan output.",
"dependencies": [
"bash",
"libxslt"
]
},
"nmbscan": {
"version": "1.2.6-4",
"description": "Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.",
"dependencies": [
"samba"
]
},
"node-ar-drone": {
"version": "281.11667d4-2",
"description": "A node.js client for controlling Parrot AR Drone 2.0 quad-copters.",
"dependencies": [
"nodejs"
]
},
"nodejs-colors": {
"version": "1.4.0-1",
"description": "Get colors in your node.js console.",
"dependencies": [
"nodejs"
]
},
"nodejs-electron-packager": {
"version": "15.2.0-1",
"description": "Customize and package your Electron app with OS-specific bundles (.app, .exe etc) via JS or CL.",
"dependencies": [
"nodejs"
]
},
"nodejs-lts-gallium": {
"version": "16.20.2-2",
"description": "Evented I/O for V8 javascript (LTS release: Gallium).",
"dependencies": [
"openssl",
"zlib",
"icu",
"libuv",
"c-ares",
"brotli",
"libnghttp2"
]
},
"nodejs-lts-gallium-debug": {
"version": "16.20.2-2",
"description": "Detached debugging symbols for nodejs-lts-gallium",
"dependencies": []
},
"nohidy": {
"version": "67.22c1283-3",
"description": "The system admins best friend, multi platform auditing tool.",
"dependencies": [
"python2"
]
},
"nohidy-debug": {
"version": "67.22c1283-3",
"description": "Detached debugging symbols for nohidy",
"dependencies": []
},
"nomorexor": {
"version": "2.84489f9-4",
"description": "Tool to help guess a files 256 byte XOR key by using frequency analysis.",
"dependencies": [
"python2",
"python2-yara"
]
},
"noriben": {
"version": "193.e7701dc-5",
"description": "Portable, Simple, Malware Analysis Sandbox.",
"dependencies": [
"python",
"python-argparse",
"python-magic"
]
},
"nosqlattack": {
"version": "98.a5b0329-3",
"description": "Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks.",
"dependencies": [
"python2",
"python2-httplib2",
"python2-pymongo",
"python2-requests",
"python2-ipcalc",
"python2-shodan",
"mongodb"
]
},
"nosqli": {
"version": "37.6fce3eb-1",
"description": "NoSQL scanner and injector.",
"dependencies": []
},
"nosqli-user-pass-enum": {
"version": "18.1b3713a-9",
"description": "Script to enumerate usernames and passwords from vulnerable web applications running MongoDB.",
"dependencies": [
"python",
"python-argparse",
"python-colorama",
"python-requests"
]
},
"nosqlmap": {
"version": "298.efe6f7a-1",
"description": "Automated Mongo database and NoSQL web application exploitation tool",
"dependencies": [
"python2",
"python2-pymongo",
"python2-httplib2",
"python2-pbkdf2",
"python2-ipcalc",
"python2-couchdb",
"python2-requests",
"python2-six",
"mongodb"
]
},
"notspikefile": {
"version": "1:0.1-5",
"description": "A Linux based file format fuzzing tool",
"dependencies": []
},
"novahot": {
"version": "23.69857bb-1",
"description": "A webshell framework for penetration testers.",
"dependencies": [
"nodejs"
]
},
"novnc": {
"version": "1.4.0-7",
"description": "HTML VNC Client Library and Application.",
"dependencies": [
"bash",
"which",
"inetutils",
"websockify",
"python-numpy"
]
},
"nray": {
"version": "59.30517fd-2",
"description": "Distributed port scanner.",
"dependencies": []
},
"nsdtool": {
"version": "0.1-6",
"description": "A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password.",
"dependencies": [
"python",
"python2",
"python3",
"python2-configparser"
]
},
"nsearch": {
"version": "353.bd8205b-3",
"description": "Minimal script to help find script into the nse database.",
"dependencies": [
"python2",
"python2-python-nmap",
"python2-pysqlite",
"python2-yaml",
"python2-python-i18n"
]
},
"nsec3map": {
"version": "20.1263537-1",
"description": "A tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-numpy",
"python2-scipy",
"openssl"
]
},
"nsec3walker": {
"version": "20101223-5",
"description": "Enumerates domain names using DNSSEC",
"dependencies": []
},
"nsntrace": {
"version": "81.4d02e74-1",
"description": "Perform network trace of a single process by using network namespaces.",
"dependencies": [
"dbus",
"docbook-xsl",
"glibc",
"libpcap",
"libgcrypt",
"libgpg-error",
"lz4",
"libnl",
"libsystemd",
"libusb",
"libxslt",
"xz",
"iptables"
]
},
"nsoq": {
"version": "1.9.5-1",
"description": "A Network Security Tool for packet manipulation that allows a large number of options.",
"dependencies": []
},
"ntds-decode": {
"version": "0.1-6",
"description": "This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.",
"dependencies": []
},
"ntdsxtract": {
"version": "34.7fa1c8c-3",
"description": "Active Directory forensic framework.",
"dependencies": [
"python2"
]
},
"ntfs-file-extractor": {
"version": "6.f2b23d72-1",
"description": "Extract files off NTFS.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"ntfs-log-tracker": {
"version": "1:1.6-1",
"description": "This tool can parse $LogFile, $UsnJrnl of NTFS.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"ntlm-challenger": {
"version": "8.bd61ef6-6",
"description": "Parse NTLM over HTTP challenge messages.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"impacket"
]
},
"ntlmrecon": {
"version": "78.b5778a0-4",
"description": "A tool to enumerate information from NTLM authentication enabled web endpoints.",
"dependencies": [
"python",
"python-ordered-set",
"python-iptools",
"python-termcolor",
"python-requests",
"python-colorama"
]
},
"ntlm-scanner": {
"version": "6.4b29329-6",
"description": "A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities.",
"dependencies": [
"python2",
"python2-impacket",
"python2-setuptools"
]
},
"ntlm-theft": {
"version": "26.512074d-4",
"description": "A tool for generating multiple types of NTLMv2 hash theft files.",
"dependencies": [
"python",
"python-xlsxwriter"
]
},
"ntlmv1-multi": {
"version": "79.c7bcdc7-3",
"description": "NTLMv1 Multitool.",
"dependencies": [
"python"
]
},
"ntpdos": {
"version": "1:4.3fe389b-1",
"description": "PoC for distributed NTP reflection DoS (CVE-2013-5211)",
"dependencies": []
},
"ntp-fingerprint": {
"version": "0.1-1",
"description": "An active fingerprinting utility specifically designed to identify the OS the NTP server is running on.",
"dependencies": [
"perl"
]
},
"ntp-ip-enum": {
"version": "0.1-5",
"description": "Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.",
"dependencies": [
"python2"
]
},
"nuclei": {
"version": "2:v3.3.8.r46.g047d49f6f-1",
"description": "A fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.",
"dependencies": [
"nuclei-templates"
]
},
"nuclei-debug": {
"version": "2:v3.3.8.r46.g047d49f6f-1",
"description": "Detached debugging symbols for nuclei",
"dependencies": []
},
"nuclei-templates": {
"version": "1:v10.1.3.r4.g8c82563e8b-1",
"description": "Community curated list of template files for the nuclei engine.",
"dependencies": []
},
"nullinux": {
"version": "124.9f8727a-4",
"description": "Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions.",
"dependencies": [
"python",
"python-ipparser"
]
},
"nullscan": {
"version": "1.0.1-7",
"description": "A modular framework designed to chain and automate security tests.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-colorama",
"python-dnspython",
"python-get-mac",
"python-google",
"python-ipwhois",
"python-netaddr",
"python-netifaces",
"python-psutil",
"python-python-libnmap",
"python-python-whois",
"python-requests",
"nmap"
]
},
"nxcrypt": {
"version": "32.6ae06b5-5",
"description": "Python backdoor framework.",
"dependencies": [
"python"
]
},
"nzyme": {
"version": "1.2.2-1",
"description": "WiFi defense system.",
"dependencies": [
"java-environment"
]
},
"o365enum": {
"version": "19.522a54c-4",
"description": "Username enumeration and password enuming tool aimed at Microsoft O365.",
"dependencies": [
"python",
"python-requests"
]
},
"o365spray": {
"version": "160.28d8d1b-4",
"description": "Username enumeration and password spraying tool aimed at Microsoft O365.",
"dependencies": [
"python",
"python-requests",
"python-colorama"
]
},
"oat": {
"version": "1.3.1-2",
"description": "A toolkit that could be used to audit security within Oracle database servers.",
"dependencies": []
},
"obevilion": {
"version": "409.29fbe9d-6",
"description": "Another archive cracker created in python, cracking [zip/7z/rar].",
"dependencies": [
"python2",
"python2-colorama",
"python2-pyqt4",
"tk",
"unrar",
"p7zip"
]
},
"obexftp": {
"version": "0.24.2-13",
"description": "A tool for transfer files to/from any OBEX enabled device.",
"dependencies": [
"openobex",
"expat",
"fuse2"
]
},
"obexftp-debug": {
"version": "0.24.2-13",
"description": "Detached debugging symbols for obexftp",
"dependencies": []
},
"obexstress": {
"version": "0.1-7",
"description": "Script for testing remote OBEX service for some potential vulnerabilities.",
"dependencies": [
"python2",
"lightblue",
"python2-pybluez"
]
},
"obfs4proxy": {
"version": "0.0.13-1",
"description": "A pluggable transport proxy written in Go.",
"dependencies": []
},
"objdump2shellcode": {
"version": "28.c2d6120-1",
"description": "A tool I have found incredibly useful whenever creating custom shellcode.",
"dependencies": [
"python"
]
},
"objection": {
"version": "1.11.0-11",
"description": "Instrumented Mobile Pentest Framework.",
"dependencies": [
"python",
"python-frida",
"python-frida-tools",
"python-prompt_toolkit",
"python-click",
"python-tabulate",
"python-requests",
"python-flask",
"python-delegator.py",
"python-pexpect",
"python-litecli",
"python-semver",
"python-sqlparse"
]
},
"oclhashcat": {
"version": "1:2.01-2",
"description": "Worlds fastest WPA cracker with dictionary mutation engine.",
"dependencies": []
},
"ocs": {
"version": "0.2-6",
"description": "Compact mass scanner for Cisco routers with default telnet/enable passwords.",
"dependencies": []
},
"octopwnweb": {
"version": "14.e0f83ee-2",
"description": "Internal pentest framework running in your browser via WebAssembly, powerd by Pyodide",
"dependencies": [
"python-wsnet"
]
},
"office-dde-payloads": {
"version": "34.53291f9-7",
"description": "Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.",
"dependencies": [
"python",
"python-future",
"python-lxml"
]
},
"ofp-sniffer": {
"version": "230.4b79b6c-1",
"description": "An OpenFlow sniffer to help network troubleshooting in production networks.",
"dependencies": [
"python",
"python-pcapy",
"python-termcolor",
"python-flask",
"python-yaml",
"python-dateutil",
"python-hexdump",
"python-influxdb",
"python-python-openflow"
]
},
"ohrwurm": {
"version": "1.7a1182a-1",
"description": "A small and simple RTP fuzzer.",
"dependencies": [
"glibc",
"libpcap"
]
},
"okadminfinder": {
"version": "122.a165681-1",
"description": "Tool to find admin panels / admin login pages.",
"dependencies": [
"python",
"python-colorama",
"python-requests",
"python-argparse",
"python-tqdm",
"python-pysocks",
"python-trio",
"python-httpx",
"python-socksio"
]
},
"oledump": {
"version": "0.0.77-5",
"description": "Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.",
"dependencies": [
"python",
"python-lxml",
"python-yara-python-dex",
"python-olefile"
]
},
"ollydbg": {
"version": "201g-8",
"description": "A 32-bit assembler-level analysing debugger.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"omen": {
"version": "19.10aa99e-1",
"description": "Ordered Markov ENumerator - Password Guesser.",
"dependencies": []
},
"omi": {
"version": "1:1.6.2.0.r621.gac91a8f-1",
"description": "Open Management Infrastructure.",
"dependencies": [
"bind-tools",
"inetutils",
"krb5",
"lsb-release",
"openssl",
"pam-krb5",
"pam"
]
},
"omnibus": {
"version": "129.88dbf5d-5",
"description": "OSINT tool for intelligence collection, research and artifact management.",
"dependencies": [
"python2",
"python2-pymongo",
"python2-cmd2",
"python2-threatcrowd",
"python2-cymon",
"python2-redis",
"python2-requests",
"python2-censys",
"python2-beautifulsoup3",
"python2-fuzzyfinder",
"python2-dnspython",
"python2-ipwhois",
"redis",
"mongodb",
"python2-pygments",
"python2-backports.functools_lru_cache",
"python2-contextlib2"
]
},
"omnihash": {
"version": "70.870e9ae-7",
"description": "Hash files, strings, input streams and network resources in various common algorithms simultaneously.",
"dependencies": [
"python2",
"python2-requests",
"python2-crcmod",
"python2-click",
"python2-colorama",
"python2-validators",
"python2-pyblake2",
"python2-sha3",
"python2-setuptools",
"python2-certifi"
]
},
"one-lin3r": {
"version": "65.168bb6d-4",
"description": "Gives you one-liners that aids in penetration testing and more.",
"dependencies": [
"python",
"python-argparse",
"python-terminaltables",
"python-pyperclip",
"python-prompt_toolkit"
]
},
"onesixtyone": {
"version": "0.7-4",
"description": "An SNMP scanner that sends multiple SNMP requests to multiple IP addresses",
"dependencies": []
},
"onetwopunch": {
"version": "v1.0.0.r2.gd4ab4e8-1",
"description": "Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.",
"dependencies": [
"nmap",
"unicornscan"
]
},
"onioff": {
"version": "84.34dc309-9",
"description": "An onion url inspector for inspecting deep web links.",
"dependencies": [
"python",
"python-requests",
"python-beautifulsoup4",
"python-termcolor",
"python-pysocks"
]
},
"oniongrok-debug": {
"version": "v1.1.11.r0.gcbae9e7-1",
"description": "Detached debugging symbols for oniongrok",
"dependencies": []
},
"oniongrok": {
"version": "v1.1.11.r0.gcbae9e7-1",
"description": "Onion addresses for anything.",
"dependencies": [
"glibc"
]
},
"onionscan": {
"version": "130.da42865-3",
"description": "Scan Onion Services for Security Issues.",
"dependencies": [
"libexif"
]
},
"onionsearch": {
"version": "44.fc9d62c-3",
"description": "Script that scrapes urls on different \".onion\" search engines.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests",
"python-tqdm",
"python-urllib3"
]
},
"opendht-c": {
"version": "1:v3.3.1rc1.r2.gb0fa19d6-1",
"description": "C++17 Distributed Hash Table implementation.",
"dependencies": [
"argon2",
"asio",
"gnutls",
"jsoncpp",
"nettle",
"readline"
]
},
"opendht-c-debug": {
"version": "1:v3.3.1rc1.r2.gb0fa19d6-1",
"description": "Detached debugging symbols for opendht-c",
"dependencies": []
},
"opendoor": {
"version": "422.d1ed311-2",
"description": "OWASP WEB Directory Scanner.",
"dependencies": [
"python",
"python-urllib3",
"python-json2html",
"python-tabulate",
"python-argparse",
"python-ddt",
"python-mock"
]
},
"openobex": {
"version": "1.7.2-5",
"description": "Implementation of the OBject EXchange (OBEX) protocol.",
"dependencies": [
"libusb",
"bluez-libs"
]
},
"openpuff": {
"version": "4.01-3",
"description": "Yet not another steganography SW.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"openrisk-debug": {
"version": "v0.0.1.r22.gb536ea0-1",
"description": "Detached debugging symbols for openrisk",
"dependencies": []
},
"openrisk": {
"version": "v0.0.1.r22.gb536ea0-1",
"description": "Generates a risk score based on the results of a Nuclei scan using OpenAI's GPT-3 model.",
"dependencies": []
},
"openscap": {
"version": "1.4.1.r16.g5a63d1e83-1",
"description": "Open Source Security Compliance Solution.",
"dependencies": [
"acl",
"attr",
"bzip2",
"curl",
"dbus-glib",
"dbus",
"gconf",
"libcap-ng",
"libcap",
"libgcrypt",
"libldap",
"libutil-linux",
"libxml2",
"libxslt",
"openldap",
"pcre",
"pcre2",
"perl-xml-parser",
"perl-xml-xpath",
"perl",
"procps-ng",
"python",
"swig",
"xmlsec"
]
},
"openscap-debug": {
"version": "1.4.1.r16.g5a63d1e83-1",
"description": "Detached debugging symbols for openscap",
"dependencies": []
},
"openssh-askpass": {
"version": "2.1.0-4",
"description": "A plasma-like passphrase dialog for ssh.",
"dependencies": [
"openssh",
"qt5-x11extras",
"qt5-svg",
"xcb-util-keysyms"
]
},
"openssl-1.0": {
"version": "1.0.2.u-4",
"description": "The Open Source toolkit for Secure Sockets Layer and Transport Layer Security with Chacha20 cipher.",
"dependencies": [
"perl"
]
},
"openssl-1.0-debug": {
"version": "1.0.2.u-4",
"description": "Detached debugging symbols for openssl-1.0",
"dependencies": []
},
"openstego": {
"version": "0.8.6-1",
"description": "A tool implemented in Java for generic steganography, with support for password-based encryption of the data.",
"dependencies": [
"java-environment"
]
},
"opensvp": {
"version": "65.df54ed8-4",
"description": "A security tool implementing \"attacks\" to be able to the resistance of firewall to protocol level attack.",
"dependencies": [
"python2",
"python2-scapy",
"ftplib"
]
},
"openvas": {
"version": "20241207-1",
"description": "Meta package for installing all OpenVAS components.",
"dependencies": [
"gsa",
"gsad",
"gvmd",
"gvm-libs",
"openvas-scanner",
"ospd-openvas",
"pg-gvm",
"greenbone-feed-sync"
]
},
"openvas-scanner": {
"version": "23.13.1-1",
"description": "OpenVAS Scanner of the Greenbone Community Edition.",
"dependencies": [
"gvm-libs",
"json-glib",
"libbsd",
"libgcrypt",
"redis",
"rsync"
]
},
"openvas-scanner-debug": {
"version": "23.13.1-1",
"description": "Detached debugging symbols for openvas-scanner",
"dependencies": []
},
"openwebrx": {
"version": "1.2.2.r389.g640c5b0-4",
"description": "Open source, multi-user SDR receiver software with a web interface.",
"dependencies": [
"python",
"python-pycsdr",
"csdr",
"airspyhf",
"libsdrplay",
"rtl-sdr",
"python-js8py",
"owrx_connector",
"netcat"
]
},
"operative": {
"version": "1:148.163acdf-1",
"description": "Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics ...).",
"dependencies": [
"sqlite"
]
},
"orakelcrackert": {
"version": "1.00-3",
"description": "This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm.",
"dependencies": []
},
"orbited": {
"version": "0.7.10-8",
"description": "A browser(javascript)->tcp bridge; Comet is used to emulate TCP connections in the browser; Allows you to connect a web browser directly to an IRC or XMPP server, for instance.",
"dependencies": [
"python2",
"python-simplejson",
"morbid",
"stomper",
"python2-twistedx",
"python2-demjson"
]
},
"origami": {
"version": "2.1.0-13",
"description": "Aims at providing a scripting tool to generate and analyze malicious PDF files.",
"dependencies": [
"ruby",
"rubygems",
"ruby-rdoc",
"ruby-colorize"
]
},
"orjail": {
"version": "200.ae38ba2-1",
"description": "A more secure way to force programs to exclusively use tor network.",
"dependencies": [
"bash",
"firejail",
"tor",
"bc",
"iptables"
]
},
"o-saft": {
"version": "6993.750d2570-1",
"description": "A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.",
"dependencies": [
"perl",
"perl-io-socket-ssl",
"perl-net-ssleay",
"perl-io-socket-inet6"
]
},
"oscanner": {
"version": "1.0.6-7",
"description": "An Oracle assessment framework developed in Java.",
"dependencies": [
"java-environment"
]
},
"osert": {
"version": "94.5ce557e-2",
"description": "Markdown Templates for Offensive Security exam reports.",
"dependencies": [
"ruby",
"p7zip",
"haskell-pandoc",
"texlive-core",
"texlive-fontsextra",
"texlive-fontsrecommended",
"texlive-latexextra"
]
},
"osfooler-ng": {
"version": "2.c0b20d6-4",
"description": "Prevents remote active/passive OS fingerprinting by tools like nmap or p0f.",
"dependencies": [
"python2",
"python2-scapy",
"python2-nfqueue",
"python2-dpkt"
]
},
"osi.ig": {
"version": "101.4debaa2-6",
"description": "Instagram OSINT Tool gets a range of information from an Instagram account.",
"dependencies": [
"python",
"python-certifi",
"python-chardet",
"python-idna",
"python-requests",
"python-urllib3"
]
},
"osinterator": {
"version": "3.8447f58-1",
"description": "Open Source Toolkit for Open Source Intelligence Gathering.",
"dependencies": []
},
"osintgram": {
"version": "1.3.r9.g3c61e53-5",
"description": "OSINT tool offering an interactive shell to perform analysis on Instagram account of any users by its nickname.",
"dependencies": [
"python",
"python-instagram-private-api",
"python-requests",
"python-requests-toolbelt",
"python-geopy",
"python-gnureadline",
"python-prettytable"
]
},
"osint-spy": {
"version": "25.03dcf48-7",
"description": "Performs OSINT scan on email/domain/ip_address/organization.",
"dependencies": [
"python",
"python-argparse",
"python-requests",
"python-clearbit",
"python-pythonwhois",
"python-steganography",
"python-fullcontactpy",
"python-shodan",
"sslscan",
"python-prospector"
]
},
"ospd-openvas": {
"version": "22.7.1-4",
"description": "An OSP server implementation to allow GVM to remotely control an OpenVAS Scanner.",
"dependencies": [
"openvas-scanner",
"python-redis",
"python-psutil",
"python-packaging",
"python-lxml",
"python-defusedxml",
"python-deprecated",
"python-paho-mqtt",
"python-gnupg"
]
},
"osrframework": {
"version": "840.e02a6e9-6",
"description": "A project focused on providing API and tools to perform more accurate online researches.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-requests",
"python-tweepy",
"python-python-emailahoy3",
"python-networkx",
"python-decorator",
"python-validate-email",
"python-tabulate",
"python-oauthlib",
"python-python-whois",
"python-yaml",
"python-colorama",
"python-cfscrape",
"python-pyexcel",
"python-pyexcel-text",
"python-pyexcel-xls",
"python-pyexcel-xlsx",
"python-pyexcel-ods",
"python-pyexcel-io"
]
},
"osslsigncode": {
"version": "654.e8f19a6-1",
"description": "A small tool that implements part of the functionality of the Microsoft tool signtool.exe.",
"dependencies": [
"gcc",
"make",
"automake",
"autoconf",
"libtool",
"openssl",
"lib32-libcurl-gnutls"
]
},
"osslsigncode-debug": {
"version": "654.e8f19a6-1",
"description": "Detached debugging symbols for osslsigncode",
"dependencies": []
},
"ostinato": {
"version": "0.9-4",
"description": "An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be \"Wireshark in Reverse\" and thus become complementary to Wireshark.",
"dependencies": [
"qt4",
"libpcap",
"protobuf",
"protobuf-c"
]
},
"osueta": {
"version": "82.2ee8068-5",
"description": "A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.",
"dependencies": [
"python2",
"python2-ipy",
"python2-python-nmap",
"python2-paramiko"
]
},
"otori": {
"version": "0.3-5",
"description": "Toolbox intended to allow useful exploitation of XML external entity (\"XXE\") vulnerabilities.",
"dependencies": [
"python2",
"python2-simplejson"
]
},
"outguess": {
"version": "0.4-1",
"description": "A universal steganographic tool.",
"dependencies": [
"bash"
]
},
"outguess-debug": {
"version": "0.4-1",
"description": "Detached debugging symbols for outguess",
"dependencies": []
},
"outlook-webapp-brute": {
"version": "1.61d7177-4",
"description": "Microsoft Outlook WebAPP Brute.",
"dependencies": [
"python2"
]
},
"owabf": {
"version": "1.3-4",
"description": "Outlook Web Access bruteforcer tool.",
"dependencies": []
},
"owasp-bywaf": {
"version": "26.e730d1b-1",
"description": "A web application penetration testing framework (WAPTF).",
"dependencies": []
},
"owasp-zsc": {
"version": "316.f763dea-3",
"description": "Shellcode/Obfuscate Code Generator.",
"dependencies": [
"python2"
]
},
"owrx_connector": {
"version": "0.6.2.r26.g03d5b97-1",
"description": "Connectors used by OpenWebRX to interface with SDR hardware.",
"dependencies": [
"csdr",
"libsamplerate"
]
},
"owrx_connector-debug": {
"version": "0.6.2.r26.g03d5b97-1",
"description": "Detached debugging symbols for owrx_connector",
"dependencies": []
},
"owtf": {
"version": "2187.af993ecb-1",
"description": "The Offensive (Web) Testing Framework.",
"dependencies": [
"python",
"python-virtualenv",
"postgresql",
"python-pyaml",
"python-yaml"
]
},
"pack": {
"version": "0.0.4-8",
"description": "Password Analysis and Cracking Kit",
"dependencies": [
"python2",
"aspell",
"aspell-en"
]
},
"packerid": {
"version": "16.bc54e6d-4",
"description": "Script which uses a PEiD database to identify which packer (if any) is being used by a binary.",
"dependencies": [
"python",
"python-pefile",
"capstone"
]
},
"packet-o-matic": {
"version": "351-3",
"description": "A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.",
"dependencies": []
},
"packetq": {
"version": "306.201eb88-1",
"description": "A tool that provides a basic SQL-frontend to PCAP-files.",
"dependencies": [
"zlib"
]
},
"packetq-debug": {
"version": "306.201eb88-1",
"description": "Detached debugging symbols for packetq",
"dependencies": []
},
"packetsender": {
"version": "1134.5a9452e-1",
"description": "An open source utility to allow sending and receiving TCP and UDP packets.",
"dependencies": [
"openssl",
"qt5-base",
"libxcb",
"libcap",
"libgcrypt",
"libpng",
"glib2"
]
},
"packetsender-debug": {
"version": "1134.5a9452e-1",
"description": "Detached debugging symbols for packetsender",
"dependencies": []
},
"packit": {
"version": "1.0-1",
"description": "A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.",
"dependencies": []
},
"pacu": {
"version": "1546.5cbdb01-1",
"description": "The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.",
"dependencies": [
"python",
"python-argparse",
"aws-cli",
"python-botocore",
"python-pysocks",
"python-s3transfer",
"python-flake8-debugger",
"python-pytz",
"python-requests",
"python-urllib3",
"python-sqlalchemy",
"python-boto3",
"python-sqlalchemy-utils",
"python-typing_extensions",
"python-dsnap"
]
},
"pacumen": {
"version": "1.92a0884-7",
"description": "Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).",
"dependencies": [
"python2",
"python2-scipy",
"python2-numpy",
"python2-scapy",
"python2-symath",
"python2-pydot",
"python2-pyqt5"
]
},
"padbuster": {
"version": "11.50e4a3e-5",
"description": "Automated script for performing Padding Oracle attacks.",
"dependencies": [
"perl",
"perl-crypt-ssleay",
"perl-bytes-random-secure"
]
},
"padoracle": {
"version": "v0.1.1.r26.g2aa6c99-1",
"description": "Padding Oracle Attack with Node.js.",
"dependencies": [
"nodejs"
]
},
"padre-debug": {
"version": "v2.2.0.r10.g18618f5-1",
"description": "Detached debugging symbols for padre",
"dependencies": []
},
"padre": {
"version": "v2.2.0.r10.g18618f5-1",
"description": "Padding Oracle attack tool.",
"dependencies": []
},
"pafish": {
"version": "193.b497899-1",
"description": "A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.",
"dependencies": []
},
"pagodo": {
"version": "154.6490b04-1",
"description": "Google dork script to collect potentially vulnerable web pages and applications on the Internet.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-google",
"python-numpy",
"python-requests",
"python-yagooglesearch"
]
},
"paho-mqtt-c": {
"version": "1.3.10-1",
"description": "An Eclipse Paho C client library for MQTT.",
"dependencies": [
"openssl"
]
},
"paketto": {
"version": "1.10-4",
"description": "Advanced TCP/IP Toolkit.",
"dependencies": []
},
"panhunt": {
"version": "63.ec87e88-3",
"description": "Searches for credit card numbers (PANs) in directories.",
"dependencies": [
"python2",
"python2-colorama",
"python2-progressbar"
]
},
"panhunt-debug": {
"version": "63.ec87e88-3",
"description": "Detached debugging symbols for panhunt",
"dependencies": []
},
"panoptic": {
"version": "185.df35a6c-4",
"description": "A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.",
"dependencies": [
"python2"
]
},
"pappy-proxy": {
"version": "77.e1bb049-4",
"description": "An intercepting proxy for web application testing.",
"dependencies": [
"python2",
"python2-autobahn",
"python2-twistedx",
"python2-pyopenssl",
"python2-simplejson",
"python2-pysqlite",
"python2-apsw",
"python2-pygments",
"python2-mock",
"python2-pytest",
"python2-cmd2",
"python2-pytest-cov",
"python2-j2cli",
"python2-beautifulsoup4",
"python2-service-identity",
"python2-crochet",
"python2-pytest-twisted",
"python2-pytest-mock",
"python2-scrypt",
"python2-decorator",
"python2-txsocksx",
"python2-parsley"
]
},
"parameth": {
"version": "56.8da6f27-4",
"description": "This tool can be used to brute discover GET and POST parameters.",
"dependencies": [
"python2",
"python2-argparse",
"python2-requests",
"python2-numpy",
"python2-fuzzywuzzy"
]
},
"parampampam": {
"version": "45.9171018-6",
"description": "This tool for brute discover GET and POST parameters.",
"dependencies": [
"python",
"python-beautifulsoup4",
"python-esprima",
"python-fuzzywuzzy",
"python-html5lib",
"python-requests",
"python-urllib3",
"python-levenshtein"
]
},
"paranoic": {
"version": "1.7-6",
"description": "A simple vulnerability scanner written in Perl.",
"dependencies": [
"perl",
"perl-color-output",
"perl-image-exiftool",
"perl-dbi",
"perl-dbd-mysql",
"perl-libwww",
"perl-html-form"
]
},
"paraxor-dwm": {
"version": "6.0-4",
"description": "Dynamic window manager for X (paraxor's fork).",
"dependencies": []
},
"paraxor-slock": {
"version": "1.1-1",
"description": "A simple screen locker for X (paraxor's fork)",
"dependencies": []
},
"paraxor-st": {
"version": "0.4.1-2",
"description": "A simple virtual terminal emulator for X (paraxor's fork)",
"dependencies": []
},
"paros": {
"version": "3.2.13-9",
"description": "Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc.",
"dependencies": [
"java-environment"
]
},
"parse-evtx": {
"version": "3.a4b02b9-1",
"description": "A tool to parse the Windows XML Event Log (EVTX) format.",
"dependencies": []
},
"parsero": {
"version": "81.e5b585a-10",
"description": "A robots.txt audit tool.",
"dependencies": [
"python3",
"python-urllib3",
"python-beautifulsoup4"
]
},
"paru": {
"version": "2.0.4-1",
"description": "Feature packed AUR helper.",
"dependencies": [
"git",
"pacman"
]
},
"paru-debug": {
"version": "2.0.4-1",
"description": "Detached debugging symbols for paru",
"dependencies": []
},
"pasco": {
"version": "20040505_1-5",
"description": "Examines the contents of Internet Explorer's cache files for forensic purposes",
"dependencies": []
},
"passcracking": {
"version": "20131214-1",
"description": "A little python script for sending hashes to passcracking.com and milw0rm",
"dependencies": []
},
"passdetective": {
"version": "1.0.6.r3.ge3aebf2-1",
"description": "Scans shell command history to detect mistakenly written passwords, API keys, and secrets.",
"dependencies": []
},
"passdetective-debug": {
"version": "1.0.6.r3.ge3aebf2-1",
"description": "Detached debugging symbols for passdetective",
"dependencies": []
},
"passe-partout": {
"version": "0.1-2",
"description": "Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns.",
"dependencies": [
"openssl"
]
},
"passgan": {
"version": "38.5927158-5",
"description": "A Deep Learning Approach for Password Guessing.",
"dependencies": [
"python",
"python-matplotlib",
"python-numpy",
"python-tensorflow"
]
},
"passhunt": {
"version": "5.332f374-4",
"description": "Search drives for documents containing passwords.",
"dependencies": [
"python2",
"python2-colorama",
"python2-progressbar"
]
},
"passivedns": {
"version": "297.be48a8e-1",
"description": "A network sniffer that logs all DNS server replies for use in a passive DNS setup.",
"dependencies": [
"gcc",
"libpcap",
"ldns"
]
},
"passivedns-debug": {
"version": "297.be48a8e-1",
"description": "Detached debugging symbols for passivedns",
"dependencies": []
},
"pass-station": {
"version": "v2.0.0.r4.gbe184e9-1",
"description": "CLI & library to search for default credentials among thousands of Products / Vendors.",
"dependencies": [
"ruby",
"ruby-paint",
"ruby-docopt"
]
},
"pastejacker": {
"version": "12.ed9f153-9",
"description": "Hacking systems with the automation of PasteJacking attacks.",
"dependencies": [
"metasploit",
"ncurses",
"python",
"python-gnureadline",
"python-jinja"
]
},
"pastemonitor": {
"version": "12.bc5d326-1",
"description": "Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match..",
"dependencies": [
"python",
"python-requests"
]
},
"pasv-agrsv": {
"version": "57.6bb54f7-3",
"description": "Passive recon / OSINT automation script.",
"dependencies": [
"python2",
"python2-dnspython",
"python2-elixir",
"python2-sqlalchemy"
]
},
"patator": {
"version": "1:235.5be299a-1",
"description": "A multi-purpose bruteforcer.",
"dependencies": [
"python",
"python-paramiko",
"python-pycurl",
"python-dnspython",
"mysql-python",
"python-psycopg2",
"python-pycryptodome",
"python-pysnmp",
"python-ipy",
"python-pyopenssl",
"python-ajpy",
"python-cx_oracle",
"python-pyasn1",
"impacket",
"java-environment",
"unzip",
"ike-scan",
"openldap"
]
},
"patchkit": {
"version": "37.95dc699-3",
"description": "Powerful binary patching from Python.",
"dependencies": [
"python2",
"python2-coding",
"python2-capstone",
"python2-keystone",
"unicorn"
]
},
"pathzuzu": {
"version": "64.4f4533c-2",
"description": "Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables.",
"dependencies": [
"bash"
]
},
"pax-debug": {
"version": "v0.2.2.r1.g38ac0d8-1",
"description": "Detached debugging symbols for pax",
"dependencies": []
},
"pax-oracle-debug": {
"version": "v0.2.2.r1.g38ac0d8-1",
"description": "Detached debugging symbols for pax-oracle",
"dependencies": []
},
"pax-oracle": {
"version": "v0.2.2.r1.g38ac0d8-1",
"description": "CLI tool for PKCS7 padding oracle attacks.",
"dependencies": []
},
"payloadmask": {
"version": "17.58e0525-1",
"description": "Web Payload list editor to use techniques to try bypass web application firewall.",
"dependencies": []
},
"payloadsallthethings": {
"version": "2054.0e93cae-1",
"description": "A list of useful payloads and bypass for Web Application Security and Pentest/CTF.",
"dependencies": []
},
"pblind": {
"version": "1.0-5",
"description": "Little utility to help exploiting blind sql injection vulnerabilities.",
"dependencies": [
"python2"
]
},
"pbscan": {
"version": "10.566c3d7-1",
"description": "Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.",
"dependencies": [
"openssl",
"libpcap"
]
},
"pcapfex": {
"version": "60.c51055a-3",
"description": "Packet CAPture Forensic Evidence eXtractor.",
"dependencies": [
"python2",
"python2-regex",
"python2-dpkt"
]
},
"pcapfix": {
"version": "1.1.7-1",
"description": "Tries to repair your broken pcap and pcapng files.",
"dependencies": []
},
"pcapsipdump": {
"version": "0.2-3",
"description": "A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrent SIP sessions).",
"dependencies": [
"libpcap",
"gcc-libs"
]
},
"pcapteller": {
"version": "1.1-6",
"description": "A tool designed for traffic manipulation and replay.",
"dependencies": [
"python2",
"python2-scapy",
"python2-ipcalc",
"python2-six"
]
},
"pcapxray": {
"version": "274.1721645-6",
"description": "A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction.",
"dependencies": [
"python",
"python-networkx",
"python-netaddr",
"python-ipwhois",
"tk",
"python-pillow6",
"python-stem",
"python-matplotlib",
"python-pyvis",
"python-graphviz",
"python-pyshark",
"python-cryptography",
"scapy"
]
},
"pcileech": {
"version": "4.18.0-1",
"description": "Tool, which uses PCIe hardware devices to read and write from the target system memory.",
"dependencies": [
"libusb",
"leechcore"
]
},
"pcode2code": {
"version": "6.65ae983-8",
"description": "VBA p-code decompiler.",
"dependencies": [
"python",
"python-pip",
"python-pcodedmp"
]
},
"pcredz": {
"version": "94.4e9a062-1",
"description": "A tool that extracts credit card numbers and more from a pcap file or from a live interface.",
"dependencies": [
"python",
"python-python-libpcap",
"libpcap"
]
},
"pdblaster": {
"version": "4.fc8abb3-8",
"description": "Extract PDB file paths from large sample sets of executable files.",
"dependencies": [
"python",
"python-pefile",
"python-pandas",
"python-termcolor"
]
},
"pdfbook-analyzer": {
"version": "1:2-6",
"description": "Utility for facebook memory forensics.",
"dependencies": [
"python2"
]
},
"pdfgrab": {
"version": "15.1327508-9",
"description": "Tool for searching pdfs withthin google and extracting pdf metadata.",
"dependencies": [
"python",
"python-requests",
"python-pypdf2",
"python-google",
"ipython",
"python-json2html",
"python-pycryptodome"
]
},
"pdfid": {
"version": "0.2.8-5",
"description": "Scan a file to look for certain PDF keywords.",
"dependencies": [
"python"
]
},
"pdf-parser": {
"version": "0.7.9-3",
"description": "Parses a PDF document to identify the fundamental elements used in the analyzed file.",
"dependencies": [
"python"
]
},
"pdfresurrect": {
"version": "0.12-3",
"description": "A tool aimed at analyzing PDF documents.",
"dependencies": []
},
"pdfwalker": {
"version": "1:7.64c17f0-6",
"description": "Frontend to explore the internals of a PDF document with Origami",
"dependencies": [
"ruby",
"ruby-gtk2",
"ruby-ruby-gtkhex",
"origami"
]
},
"pdgmail": {
"version": "1.0-7",
"description": "A password dictionary attack tool that targets windows authentication via the SMB protocol.",
"dependencies": [
"python2"
]
},
"peach": {
"version": "3.0.202-4",
"description": "A SmartFuzzer that is capable of performing both generation and mutation based fuzzing.",
"dependencies": []
},
"peach-fuzz": {
"version": "55.404e8ee-7",
"description": "Simple vulnerability scanning framework.",
"dependencies": [
"python2",
"python2-colorama",
"python-pwntools"
]
},
"peach-fuzz-debug": {
"version": "55.404e8ee-7",
"description": "Detached debugging symbols for peach-fuzz",
"dependencies": []
},
"peass": {
"version": "20240505.284a0ce8.r0.g74c1391-1",
"description": "Privilege Escalation Awesome Scripts SUITE (with colors).",
"dependencies": [
"bash"
]
},
"peass-debug": {
"version": "20240505.284a0ce8.r0.g74c1391-1",
"description": "Detached debugging symbols for peass",
"dependencies": []
},
"pe-bear": {
"version": "0.7.0-1",
"description": "A freeware reversing tool for PE files.",
"dependencies": []
},
"peepdf": {
"version": "0.4.2-9",
"description": "A Python tool to explore PDF files in order to find out if the file can be harmful or not.",
"dependencies": [
"python",
"python-jsbeautifier",
"python-pylibemu",
"python-future",
"python-pythonaes",
"python-colorama",
"python-pillow6"
]
},
"peepingtom": {
"version": "1:56.bc6f4d8-4",
"description": "A tool to take screenshots of websites. Much like eyewitness.",
"dependencies": [
"python2",
"curl",
"phantomjs"
]
},
"peframe": {
"version": "135.70683b6-8",
"description": "Tool to perform static analysis on (portable executable) malware.",
"dependencies": [
"python",
"python-pefile",
"python-python-magic",
"python-oletools",
"python-yara-python-dex",
"python-m2crypto",
"python-virustotal-api",
"python-magic",
"python-msoffcrypto-tool",
"python-parameterized"
]
},
"pemcrack": {
"version": "12.66e02b8-2",
"description": "Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.",
"dependencies": [
"openssl"
]
},
"pemcrack-debug": {
"version": "12.66e02b8-2",
"description": "Detached debugging symbols for pemcrack",
"dependencies": []
},
"pemcracker": {
"version": "9.a741c93-1",
"description": "Tool to crack encrypted PEM files.",
"dependencies": []
},
"penbox": {
"version": "81.3b77c69-10",
"description": "A Penetration Testing Framework - The Tool With All The Tools.",
"dependencies": [
"python2",
"python2-requests",
"python2-lxml",
"git",
"python3",
"perl",
"ruby"
]
},
"pencode": {
"version": "39.07e33ef-1",
"description": "Complex payload encoder.",
"dependencies": []
},
"pencode-debug": {
"version": "39.07e33ef-1",
"description": "Detached debugging symbols for pencode",
"dependencies": []
},
"pentbox": {
"version": "1.8-7",
"description": "A security suite that packs security and stability testing oriented tools for networks and systems.",
"dependencies": [
"ruby"
]
},
"pentestgpt": {
"version": "v0.14.0.r3.g2a1c528-5",
"description": "A penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process.",
"dependencies": [
"python"
]
},
"pentestly": {
"version": "1798.93d1b39-5",
"description": "Python and Powershell internal penetration testing framework.",
"dependencies": [
"python2",
"impacket",
"python2-dicttoxml",
"python2-dnspython",
"python2-jsonrpclib-pelix",
"python2-mechanize",
"python2-lxml",
"python2-slowaes",
"python2-xlsxwriter",
"python2-olefile",
"python2-pypdf2",
"python2-pycryptodome"
]
},
"pentmenu": {
"version": "218.2e45233-2",
"description": "A bash script for recon and DOS attacks.",
"dependencies": [
"bash",
"hping",
"openbsd-netcat",
"openssl",
"stunnel",
"nmap",
"whois"
]
},
"pepe": {
"version": "13.b81889b-4",
"description": "Collect information about email addresses from Pastebin.",
"dependencies": [
"python",
"python-colorama",
"python-urllib3",
"python-argparse",
"python-elasticsearch",
"python-google",
"python-requests",
"python-validate-email",
"python-python-pushsafer",
"python-pyhibp",
"python-fullcontactpy",
"python-piplapis-python"
]
},
"pepper": {
"version": "18.9dfcade-7",
"description": "An open source script to perform malware static analysis on Portable Executable.",
"dependencies": [
"python",
"python-pefile",
"python-yara-python-dex",
"python-requests",
"python-magic",
"lief",
"yara"
]
},
"periscope": {
"version": "3.2-2",
"description": "A PE file inspection tool.",
"dependencies": []
},
"perl-algorithm-generatesequence": {
"version": "0.02-12",
"description": "A sequence generator.",
"dependencies": [
"perl"
]
},
"perl-algorithm-permute": {
"version": "0.16-8",
"description": "Perl module for handy and fast permutations with object oriented interface.",
"dependencies": [
"perl"
]
},
"perl-alien-gmp": {
"version": "1.16-6",
"description": "Alien package for the GNU Multiple Precision library.",
"dependencies": [
"perl",
"perl-alien-base-modulebuild"
]
},
"perl-bytes-random-secure": {
"version": "0.29-9",
"description": "Perl extension to generate cryptographically-secure random bytes.",
"dependencies": [
"perl",
"perl-math-random-isaac",
"perl-crypt-random-seed"
]
},
"perl-cache-lru": {
"version": "0.04-10",
"description": "A simple, fast implementation of LRU cache in pure perl.",
"dependencies": [
"perl"
]
},
"perl-cisco-copyconfig": {
"version": "1.4-12",
"description": "IOS running-config manipulation.",
"dependencies": [
"perl-net-snmp"
]
},
"perl-class-accessor-lite": {
"version": "0.08-10",
"description": "A minimalistic variant of Class::Accessor.",
"dependencies": [
"perl"
]
},
"perl-class-errorhandler": {
"version": "0.04-12",
"description": "Base class for error handling.",
"dependencies": [
"perl"
]
},
"perl-class-gomor": {
"version": "1.03-12",
"description": "Another class and object builder",
"dependencies": [
"perl"
]
},
"perl-class-loader": {
"version": "2.03-15",
"description": "Loads modules and creates objects on demand.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-color-output": {
"version": "1.05-12",
"description": "Module to give color to the output.",
"dependencies": []
},
"perl-convert-ascii-armour": {
"version": "1.4-15",
"description": "Converts binary octets into ASCII armoured messages",
"dependencies": [
"perl",
"gmp"
]
},
"perl-convert-pem": {
"version": "0.08-15",
"description": "Read/write encrypted ASN.1 PEM files.",
"dependencies": [
"perl",
"perl-class-errorhandler",
"perl-convert-asn1>=0.10",
"perl-crypt-des_ede3"
]
},
"perl-cpan-meta": {
"version": "2.150010-2",
"description": "The distribution metadata for a CPAN dist.",
"dependencies": [
"perl",
"perl-cpan-meta-requirements",
"perl-parse-cpan-meta>=1.4403"
]
},
"perl-crypt-des_ede3": {
"version": "0.01-15",
"description": "Perl module for triple-DES EDE encryption/decryption.",
"dependencies": [
"perl-crypt-des"
]
},
"perl-crypt-dh": {
"version": "0.07-17",
"description": "Perl/CPAN Module Crypt::DH: Diffie-Hellman key exchange system.",
"dependencies": [
"perl",
"perl-math-bigint-gmp",
"perl-module-install"
]
},
"perl-crypt-dsa": {
"version": "1.17-16",
"description": "DSA Signatures and Key Generation.",
"dependencies": [
"perl",
"perl-data-buffer>=0.01",
"perl-digest-sha1",
"perl-file-which>=0.05"
]
},
"perl-crypt-idea": {
"version": "1.10-15",
"description": "Perl interface to IDEA block cipher.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-crypt-openssl-x509": {
"version": "1.908-2",
"description": "Perl extension to OpenSSL's X509 API.",
"dependencies": [
"perl"
]
},
"perl-crypt-primes": {
"version": "0.50-15",
"description": "Provable Prime Number Generator suitable for Cryptographic Applications.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-crypt-random": {
"version": "1.52-7",
"description": "Cryptographically Secure, True Random Number Generator.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-crypt-rsa": {
"version": "1.99-16",
"description": "RSA public-key cryptosystem.",
"dependencies": [
"perl-class-loader>=2.00",
"perl-convert-ascii-armour",
"perl-crypt-blowfish",
"perl-crypt-cbc",
"perl-crypt-primes>=0.38",
"perl-crypt-random>=0.34",
"perl-data-buffer",
"perl-digest-md2",
"perl-digest-sha1",
"perl-math-pari>=2.001804",
"perl-sort-versions",
"perl-tie-encryptedhash"
]
},
"perl-cryptx": {
"version": "0.072-4",
"description": "Cryptographically secure random number generator.",
"dependencies": [
"perl"
]
},
"perl-data-buffer": {
"version": "0.04-16",
"description": "Read/write buffer class.",
"dependencies": [
"perl"
]
},
"perl-data-validate-ip": {
"version": "0.31-2",
"description": "IPv4 and IPv6 validation methods",
"dependencies": [
"perl",
"perl-netaddr-ip"
]
},
"perl-date-parse": {
"version": "2.33-4",
"description": "Parse date strings into time values.",
"dependencies": [
"perl"
]
},
"perl-devel-overloadinfo": {
"version": "0.007-4",
"description": "Introspect overloaded operators.",
"dependencies": [
"perl",
"perl-mro-compat",
"perl-package-stash",
"perl-sub-identify"
]
},
"perl-digest-crc": {
"version": "0.23-4",
"description": "Generic interface to CRC algorithms.",
"dependencies": [
"perl"
]
},
"perl-digest-md2": {
"version": "2.04-16",
"description": "Perl interface to the MD2 Algorithm.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-digest-md4": {
"version": "1.9-12",
"description": "Perl interface to the MD4 Algorithm.",
"dependencies": [
"perl"
]
},
"perl-digest-perl-md5": {
"version": "1.9-6",
"description": "Perl implementation of Ron Rivests MD5 Algorithm.",
"dependencies": [
"perl"
]
},
"perl-encoding-ber": {
"version": "1.02-5",
"description": "Perl module for encoding/decoding data using ASN.1 Basic Encoding Rules (BER).",
"dependencies": [
"perl"
]
},
"perl-expect": {
"version": "1.35-10",
"description": "This module is a successor of Comm.pl and a descendent of Chat.pl. It more closely ressembles the Tcl Expect language than its predecessors.",
"dependencies": [
"perl-io-tty>=1.03"
]
},
"perl-exporter-lite": {
"version": "0.08-10",
"description": "Lightweight exporting of variables.",
"dependencies": [
"perl"
]
},
"perl-furl": {
"version": "3.14-4",
"description": "Lightning-fast URL fetcher.",
"dependencies": [
"perl"
]
},
"perl-future": {
"version": "0.47-4",
"description": "Perl module to deal with operation awaiting completion.",
"dependencies": [
"perl>=5.15.8",
"perl-test-fatal"
]
},
"perl-geography-countries": {
"version": "2009041301-6",
"description": "2-letter, 3-letter, and numerical codes for countries.",
"dependencies": [
"perl>=5.10.0"
]
},
"perl-getopt-long": {
"version": "2.58-1",
"description": "Extended processing of command line options.",
"dependencies": [
"perl>=0"
]
},
"perl-html-linkextractor": {
"version": "0.13-14",
"description": "Extract links from an HTML document.",
"dependencies": [
"perl"
]
},
"perl-html-tagparser": {
"version": "0.20-12",
"description": "Yet another HTML document parser with DOM-like methods.",
"dependencies": [
"perl>=5.10.0"
]
},
"perl-http-dav": {
"version": "0.49-7",
"description": "A client module for the WebDAV protocol.",
"dependencies": [
"perl-libwww",
"perl-uri",
"perl-xml-dom"
]
},
"perl-http-parser-xs": {
"version": "0.17-11",
"description": "A fast, primitive HTTP request parser.",
"dependencies": [
"perl"
]
},
"perl-http-request-common": {
"version": "6.32-3",
"description": "Construct common HTTP::Request objects",
"dependencies": []
},
"perl-io-async": {
"version": "0.78-4",
"description": "Asynchronous event-driven programming.",
"dependencies": [
"perl>=5.10.0",
"perl-future",
"perl-struct-dumb"
]
},
"perl-io-socket": {
"version": "1.45-4",
"description": "Object interface to socket communications.",
"dependencies": [
"perl>=0"
]
},
"perl-io-socket-ip": {
"version": "0.41-4",
"description": "Family-neutral IP socket supporting both IPv4 and IPv6.",
"dependencies": [
"perl>=0"
]
},
"perl-io-socket-portstate": {
"version": "0.03-13",
"description": "Perl extension for checking the open or closed status of a port..",
"dependencies": [
"perl>=0"
]
},
"perl-io-socket-socks": {
"version": "0.74-8",
"description": "Provides a way to create socks client or server both 4 and 5 version.",
"dependencies": [
"perl"
]
},
"perl-io-socket-socks-wrapper": {
"version": "0.17-8",
"description": "Add SOCKS support for any perl object / package / program.",
"dependencies": [
"perl",
"perl-io-socket-socks"
]
},
"perl-io-socket-timeout": {
"version": "0.32-7",
"description": "IO::Socket with read/write timeout.",
"dependencies": [
"perl>=0"
]
},
"perl-ip-country": {
"version": "2.28-10",
"description": "Fast lookup of country codes from IP addresses.",
"dependencies": [
"perl-geography-countries"
]
},
"perl-libwhisker2": {
"version": "2.5-9",
"description": "A full-featured Perl library used for HTTP-related functions, including vulnerability scanning and exploitation.",
"dependencies": [
"perl",
"perl-net-ssleay"
]
},
"perl-lwp-protocol-socks": {
"version": "1.7-10",
"description": "Adds support for the socks protocol and proxy facility.",
"dependencies": [
"perl-libwww",
"perl-io-socket-ssl",
"perl-io-socket-socks",
"perl-lwp-protocol-https"
]
},
"perl-lwp-useragent-proxyany": {
"version": "1.02-13",
"description": "A LWP UserAgent supports both HTTP_PROXY and IE proxy",
"dependencies": [
"perl-libwww"
]
},
"perl-math-bigint-gmp": {
"version": "1.6007-6",
"description": "Big integer calculations using the GNU Multiple Precision Arithmetic Library.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-math-gmp": {
"version": "2.20-7",
"description": "High speed arbitrary size integer math.",
"dependencies": [
"perl",
"gmp",
"perl-devel-checklib",
"perl-alien-base-modulebuild",
"perl-alien-gmp"
]
},
"perl-math-pari": {
"version": "4:2.030518-6",
"description": "Perl interface to PARI.",
"dependencies": [
"perl"
]
},
"perl-md5": {
"version": "2.03-10",
"description": "Perl interface to the MD5 Message-Digest Algorithm.",
"dependencies": [
"perl"
]
},
"perl-modern-perl": {
"version": "1.20200211-5",
"description": "Enable all of the features of Modern Perl with one command.",
"dependencies": [
"perl>=5.10.0"
]
},
"perl-moose": {
"version": "2.2015-4",
"description": "A postmodern object system for Perl 5.",
"dependencies": [
"perl-class-load>=0.09",
"perl-class-load-xs>=0.01",
"perl-data-optlist>=0.107",
"perl-devel-globaldestruction",
"perl-dist-checkconflicts>=0.02",
"perl-eval-closure>=0.04",
"perl-list-moreutils>=0.28",
"perl-mro-compat>=0.05",
"perl-package-deprecationmanager>=0.11",
"perl-package-stash>=0.32",
"perl-package-stash-xs>=0.24",
"perl-params-util>=1.00",
"perl-sub-exporter>=0.980",
"perl-sub-name>=0.05",
"perl-task-weaken",
"perl-test-checkdeps",
"perl-try-tiny>=0.02"
]
},
"perl-net-cidr": {
"version": "0.21-4",
"description": "Manipulate IPv4/IPv6 netblocks in CIDR notation.",
"dependencies": [
"perl"
]
},
"perl-net-dhcp": {
"version": "1:0.7_007-12",
"description": "Object methods to create a DHCP packet.",
"dependencies": [
"perl-module-build"
]
},
"perl-net-dns-lite": {
"version": "0.12-10",
"description": "A pure-perl DNS resolver with support for timeout.",
"dependencies": [
"perl"
]
},
"perl-net-frame": {
"version": "1.21-6",
"description": "The base framework for frame crafting.",
"dependencies": [
"perl-bit-vector>=0",
"perl-class-gomor>=1.00",
"perl-net-ipv6addr>=0",
"perl-socket6>=0"
]
},
"perl-net-frame-device": {
"version": "1.12-11",
"description": "Get network device information and gateway.",
"dependencies": [
"perl",
"perl-net-frame-layer-icmp6",
"perl-bit-vector",
"perl-carp-clan",
"perl-test-exception",
"perl-sub-uplevel",
"perl-net-frame",
"perl-class-gomor",
"perl-net-libdnet6",
"perl-net-pcap",
"perl-net-frame-dump",
"perl-net-write",
"perl-net-frame-layer-ipv6"
]
},
"perl-net-frame-dump": {
"version": "1.18-6",
"description": "Base-class for a tcpdump like implementation.",
"dependencies": [
"perl"
]
},
"perl-net-frame-layer-icmp6": {
"version": "1.11-6",
"description": "Internet Control Message Protocol v6 layer object.",
"dependencies": [
"perl"
]
},
"perl-net-frame-layer-ipv6": {
"version": "1.08-10",
"description": "Internet Protocol v6 layer object.",
"dependencies": [
"perl"
]
},
"perl-net-frame-layer-sinfp3": {
"version": "1.01-13",
"description": "Frame crafting made easy.",
"dependencies": [
"perl"
]
},
"perl-net-frame-simple": {
"version": "1.09-8",
"description": "Frame crafting made easy.",
"dependencies": [
"perl"
]
},
"perl-net-libdnet": {
"version": "0.99-7",
"description": "Binding for Dug Song's libdnet.",
"dependencies": [
"perl",
"perl-class-gomor",
"libdnet"
]
},
"perl-net-libdnet6": {
"version": "0.28-5",
"description": "Adds IPv6 support to Net::Libdnet.",
"dependencies": [
"perl"
]
},
"perl-net-netmask": {
"version": "2.0001-4",
"description": "Parse, manipulate and lookup IP network blocks.",
"dependencies": [
"perl"
]
},
"perl-net-nslookup": {
"version": "2.04-12",
"description": "Provide nslookup(1)-like capabilties.",
"dependencies": [
"perl"
]
},
"perl-netpacket": {
"version": "1.7.2-5",
"description": "Assemble/disassemble network packets at the protocol level.",
"dependencies": []
},
"perl-net-packet": {
"version": "3.28-12",
"description": "A unified framework to send a receive packets.",
"dependencies": [
"perl-net-ipv4addr",
"perl-bit-vector",
"perl-net-write>=1.00",
"perl-socket6",
"perl-net-pcap>=0.12",
"perl-net-libdnet",
"perl-class-gomor>=1.00",
"perl-net-ipv6addr"
]
},
"perl-net-pcap": {
"version": "0.21-1",
"description": "Perl/CPAN Module Net::Pcap.",
"dependencies": [
"perl",
"libpcap"
]
},
"perl-net-pcaputils": {
"version": "0.01-11",
"description": "Perl/CPAN Module Net::PcapUtils",
"dependencies": [
"perl",
"libpcap",
"glibc",
"perl-net-pcap"
]
},
"perl-net-rawip": {
"version": "0.25-15",
"description": "Perl extension to manipulate raw IP packets with interface to B<libpcap>.",
"dependencies": [
"libpcap",
"perl"
]
},
"perl-net-socks": {
"version": "0.03-12",
"description": "TCP/IP access through firewalls using SOCKS.",
"dependencies": [
"perl"
]
},
"perl-net-ssh2": {
"version": "0.72-4",
"description": "Support for the SSH 2 protocol via libssh2.",
"dependencies": [
"perl",
"libssh2",
"openssl",
"openssl",
"zlib"
]
},
"perl-net-ssh-perl": {
"version": "2.14-12",
"description": "Perl client interface to SSH.",
"dependencies": [
"perl-convert-pem",
"perl-crypt-dh",
"perl-crypt-dsa",
"perl-crypt-idea",
"perl-crypt-rsa",
"perl-digest-bubblebabble",
"perl-digest-hmac",
"perl-digest-sha1",
"perl-math-gmp",
"perl-string-crc32",
"perl-cryptx",
"perl-scalar-list-utils"
]
},
"perl-net-ssl-expiredate": {
"version": "1.20-1",
"description": "Obtain expiration date of certificate.",
"dependencies": [
"perl",
"perl-class-accessor",
"perl-datetime",
"perl-time-duration-parse",
"perl-universal-require"
]
},
"perl-net-subnet": {
"version": "1.03-12",
"description": "Fast IP-in-subnet matcher for IPv4 and IPv6, CIDR or mask.",
"dependencies": []
},
"perl-net-tftp": {
"version": "0.1901-10",
"description": "TFTP Client class.",
"dependencies": []
},
"perl-net-whois-ip": {
"version": "1.19-10",
"description": "Perl extension for looking up the whois information for ip addresses.",
"dependencies": [
"perl"
]
},
"perl-net-write": {
"version": "1.10-13",
"description": "A portable interface to open and send raw data to network.",
"dependencies": [
"perl-class-gomor",
"perl-socket6",
"perl-net-pcap>=0.12"
]
},
"perl-net-write-fast": {
"version": "0.18-7",
"description": "Create and inject packets fast.",
"dependencies": [
"perl-time-interval"
]
},
"perl-number-range": {
"version": "0.12-12",
"description": "Perl extension defining ranges of numbers and testing if a number is found in the range.",
"dependencies": [
"perl"
]
},
"perl-parse-registry": {
"version": "1.1-2",
"description": "Module for parsing Windows Registry files.",
"dependencies": [
"perl"
]
},
"perl-perlio-via-timeout": {
"version": "0.32-7",
"description": "A PerlIO layer that adds read & write timeout to a handle.",
"dependencies": [
"perl"
]
},
"perl-rpc-xml": {
"version": "0.82-4",
"description": "A set of classes for core data, message and XML handling.",
"dependencies": [
"perl",
"perl-xml-libxml",
"perl-libwww"
]
},
"perl-string-hexconvert": {
"version": "0.02-7",
"description": "Converts ascii strings to hex and reverse.",
"dependencies": [
"perl>=0"
]
},
"perl-string-random": {
"version": "0.31-4",
"description": "Perl module to generate random strings based on a pattern.",
"dependencies": [
"perl"
]
},
"perl-struct-dumb": {
"version": "0.12-5",
"description": "Make simple lightweight record-like structures.",
"dependencies": [
"perl"
]
},
"perl-task-weaken": {
"version": "1.06-2",
"description": "Ensure that a platform has weaken support",
"dependencies": [
"perl"
]
},
"perl-term-ansicolor": {
"version": "5.01-5",
"description": "Color screen output using ANSI escape sequences.",
"dependencies": [
"perl"
]
},
"perl-term-menu": {
"version": "0.10-12",
"description": "Perl extension for asking questions and printing menus at the terminal.",
"dependencies": [
"perl"
]
},
"perl-test-checkdeps": {
"version": "0.010-12",
"description": "Check for presence of dependencies.",
"dependencies": [
"perl",
"perl-cpan-meta-check",
"perl-module-build-tiny"
]
},
"perl-test-identity": {
"version": "0.01-5",
"description": "Perl module to test the referential identity of a reference.",
"dependencies": [
"perl",
"perl-module-build"
]
},
"perl-test-refcount": {
"version": "0.10-4",
"description": "Assert reference counts on objects.",
"dependencies": [
"perl",
"perl-module-build"
]
},
"perl-test-sharedfork": {
"version": "0.35-6",
"description": "Utility module for Test::Builder",
"dependencies": [
"perl-test-requires",
"perl>=5.008_001"
]
},
"perl-test-tcp": {
"version": "2.22-5",
"description": "Testing TCP program.",
"dependencies": [
"perl-test-sharedfork>=0.29",
"perl>=5.8.1"
]
},
"perl-test-tester": {
"version": "0.109-9",
"description": "Ease testing test modules built with Test::Builder.",
"dependencies": [
"perl"
]
},
"perl-test-without-module": {
"version": "0.18-3",
"description": "Test::Without::Module - Test fallback behaviour in absence of modules",
"dependencies": [
"perl"
]
},
"perl-text-csv": {
"version": "1.33-3",
"description": "Comma-separated values manipulator (using XS or PurePerl).",
"dependencies": [
"perl"
]
},
"perl-tftp": {
"version": "1.0b3-15",
"description": "TFTP Client class for perl.",
"dependencies": [
"perl"
]
},
"perl-tie-encryptedhash": {
"version": "1.24-15",
"description": "Hashes (and objects based on hashes) with encrypting fields.",
"dependencies": [
"perl",
"gmp"
]
},
"perl-time-duration-parse": {
"version": "0.16-4",
"description": "Parse string that represents time duration.",
"dependencies": [
"perl-exporter-lite"
]
},
"perl-time-interval": {
"version": "1.234-8",
"description": "Converts time intervals of days, hours, minutes, and seconds.",
"dependencies": [
"perl"
]
},
"perl-uniq": {
"version": "0.01-12",
"description": "Perl extension for managing list of values.",
"dependencies": [
"perl"
]
},
"perl-universal-require": {
"version": "0.19-4",
"description": "require() modules from a variable.",
"dependencies": []
},
"perl-uri-escape": {
"version": "1.76-4",
"description": "Percent-encode and percent-decode unsafe characters.",
"dependencies": [
"perl"
]
},
"perl-uri-fetch": {
"version": "0.15-4",
"description": "Smart URI fetching/caching.",
"dependencies": [
"perl>=5.8.1",
"perl-class-errorhandler",
"perl-libwww",
"perl-uri"
]
},
"perl-url-encode": {
"version": "0.03-3",
"description": "Encoding and decoding of application/x-www-form-urlencoded encoding.",
"dependencies": [
"perl>=5.8.1",
"perl-carp>=0",
"perl-exporter>=0",
"perl-xsloader>=0"
]
},
"perl-www-lw2": {
"version": "0.10-5",
"description": "WWW::LW2 - the module for easy and convenient use LW2.",
"dependencies": [
"perl"
]
},
"perl-xml-dom": {
"version": "1.46-9",
"description": "Implements Level 1 of W3's DOM.",
"dependencies": [
"perl",
"perl-xml-parser>=2.30",
"perl-xml-regexp",
"libxml-perl>=0.07",
"perl-libwww"
]
},
"perl-yaml-libyaml": {
"version": "0.63-1",
"description": "YAML module wrapping libyaml.",
"dependencies": [
"perl"
]
},
"persistencesniper": {
"version": "v1.17.1.r0.g13006aa-1",
"description": "Hunt persistences implanted in Windows machines.",
"dependencies": []
},
"pe-sieve": {
"version": "0.4.0-1",
"description": "Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).",
"dependencies": []
},
"petools": {
"version": "1.9.762-3",
"description": "Portable executable (PE) manipulation toolkit.",
"dependencies": []
},
"pev": {
"version": "0.81-6",
"description": "Command line based tool for PE32/PE32+ file analysis.",
"dependencies": [
"glibc",
"openssl",
"pcre"
]
},
"pev-debug": {
"version": "0.81-6",
"description": "Detached debugging symbols for pev",
"dependencies": []
},
"pex": {
"version": "617.0a776da-4",
"description": "A collection of special tools for providing high quality penetration testing.",
"dependencies": [
"python",
"python-requests",
"python-paramiko",
"python-requests",
"python-scapy",
"python-pydantic",
"python-netaddr",
"python-alive-progress"
]
},
"pextractor": {
"version": "0.18b-5",
"description": "A forensics tool that can extract all files from an executable file created by a joiner or similar.",
"dependencies": []
},
"pfring-dkms": {
"version": "1:3994.c00e1505-1",
"description": "Linux kernel module for packet capture at wirespeed.",
"dependencies": [
"dkms",
"linux-headers",
"numactl"
]
},
"pfring-kmod": {
"version": "1:7.2.0-1",
"description": "Linux kernel module for packet capture at wirespeed.",
"dependencies": [
"numactl"
]
},
"pftriage": {
"version": "79.d7ad183-3",
"description": "Python tool and library to help analyze files during malware triage and analysis.",
"dependencies": [
"python2",
"python2-argparse",
"python2-pefile"
]
},
"pgdbf": {
"version": "113.4e84775-1",
"description": "Convert XBase / FoxPro databases to PostgreSQL",
"dependencies": []
},
"pg-gvm": {
"version": "22.6.6-2",
"description": "Greenbone Library for helper functions in PostgreSQL.",
"dependencies": [
"gvm-libs",
"glib2",
"libical",
"postgresql"
]
},
"pg-gvm-debug": {
"version": "22.6.6-2",
"description": "Detached debugging symbols for pg-gvm",
"dependencies": []
},
"phantap": {
"version": "64.815c312-1",
"description": "An 'invisible' network tap aimed at red teams.",
"dependencies": [
"libpcap"
]
},
"phantom-evasion": {
"version": "103.2cd0673-6",
"description": "Antivirus evasion tool written in python.",
"dependencies": [
"python",
"gcc-multilib",
"mingw-w64-binutils",
"metasploit",
"mingw-w64-gcc",
"dex2jar",
"sign",
"python-pyopenssl"
]
},
"phantomjs": {
"version": "2.1.1-10",
"description": "Headless WebKit with JavaScript API.",
"dependencies": [
"fontconfig"
]
},
"phemail": {
"version": "28.302b24d-3",
"description": "A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.",
"dependencies": [
"python2",
"python2-beautifulsoup4",
"python2-dnspython"
]
},
"phishery": {
"version": "14.5743953-2",
"description": "An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector.",
"dependencies": [
"glibc"
]
},
"phishingkithunter": {
"version": "20.ac9bd1e-8",
"description": "Find phishing kits which use your brand/organization's files and image'.",
"dependencies": [
"python",
"python-tqdm",
"python-python-whois",
"python-pysocks"
]
},
"phoneinfoga-debug": {
"version": "v2.11.0.r0.g5f6156f-1",
"description": "Detached debugging symbols for phoneinfoga",
"dependencies": []
},
"phoneinfoga": {
"version": "v2.11.0.r0.g5f6156f-1",
"description": "Information gathering & OSINT framework for phone numbers.",
"dependencies": [
"glibc"
]
},
"phonesploit": {
"version": "51.0193f9e-3",
"description": "Adb exploiting tools.",
"dependencies": [
"python2",
"python2-colorama",
"android-tools"
]
},
"phonia": {
"version": "593.8ae14ff-1",
"description": "Advanced toolkits to scan phone numbers using only free resources.",
"dependencies": [
"python",
"python-phonenumbers",
"python-colorama",
"python-requests",
"python-selenium",
"python-beautifulsoup4",
"python-html5lib",
"python-config",
"geckodriver"
]
},
"phonon-qt4": {
"version": "4.10.2-1",
"description": "The multimedia framework for KDE4.",
"dependencies": [
"qt4",
"libpulse"
]
},
"phoss": {
"version": "0.1.13-7",
"description": "Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.",
"dependencies": [
"libpcap"
]
},
"phoss-debug": {
"version": "0.1.13-7",
"description": "Detached debugging symbols for phoss",
"dependencies": []
},
"photon": {
"version": "328.d88d5f3-4",
"description": "Incredibly fast crawler which extracts urls, emails, files, website accounts and much more.",
"dependencies": [
"python",
"python-requests",
"python-argparse",
"python-tld"
]
},
"php-findsock-shell": {
"version": "2.b8a984f-1",
"description": "A Findsock Shell implementation in PHP + C.",
"dependencies": [
"php"
]
},
"phpggc": {
"version": "665.177cd21-1",
"description": "A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.",
"dependencies": [
"php"
]
},
"php-malware-finder": {
"version": "0.3.4.r82.g87b6d7f-1",
"description": "Detect potentially malicious PHP files.",
"dependencies": [
"glibc",
"yara"
]
},
"php-malware-finder-debug": {
"version": "0.3.4.r82.g87b6d7f-1",
"description": "Detached debugging symbols for php-malware-finder",
"dependencies": []
},
"php-mt-seed": {
"version": "4.0-1",
"description": "PHP mt_rand() seed cracker.",
"dependencies": [
"php"
]
},
"php-pear": {
"version": "1:1.10.1-3",
"description": "PHP Extension and Application Repository.",
"dependencies": [
"php"
]
},
"php-rfi-payload-decoder": {
"version": "30.bd42caa-2",
"description": "Decode and analyze RFI payloads developed in PHP.",
"dependencies": [
"php",
"apache"
]
},
"phpsploit": {
"version": "1021.aea961d-5",
"description": "Stealth post-exploitation framework.",
"dependencies": [
"python",
"python-colorama",
"python-pygments",
"python-tornado",
"python-termcolor",
"python-pyparsing",
"python-phpserialize"
]
},
"phpstan": {
"version": "12152.cdb7e724e-1",
"description": "PHP Static Analysis Tool - discover bugs in your code without running it.",
"dependencies": [
"php"
]
},
"phpstress": {
"version": "5.f987a7e-2",
"description": "A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.",
"dependencies": [
"php"
]
},
"php-vulnerability-hunter": {
"version": "1.4.0.20-2",
"description": "An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.",
"dependencies": []
},
"phrasendrescher": {
"version": "1:1.2.2c-1",
"description": "A modular and multi processing pass phrase cracking tool.",
"dependencies": [
"openssl",
"libssh2",
"gpgme"
]
},
"pidense": {
"version": "29.ef26704-3",
"description": "Monitor illegal wireless network activities. (Fake Access Points)",
"dependencies": [
"python2",
"python2-argparse",
"python2-termcolor",
"python2-scapy"
]
},
"pin": {
"version": "3.28.r98749-1",
"description": "A dynamic binary instrumentation tool.",
"dependencies": [
"gcc",
"lib32-gcc-libs"
]
},
"pingcastle": {
"version": "3.2.0.1-1",
"description": "Active Directory scanning tool.",
"dependencies": []
},
"pinkerton": {
"version": "1.6.r19.g3195a4a-5",
"description": "JavaScript file crawler and secret finder.",
"dependencies": [
"python",
"openssl",
"python-rich",
"python-requests",
"python-jsbeautifier"
]
},
"pintool": {
"version": "24.d538a79-3",
"description": "This tool can be useful for solving some reversing challenges in CTFs events.",
"dependencies": [
"python2"
]
},
"pintool2": {
"version": "5.1c1af91-4",
"description": "Improved version of pintool.",
"dependencies": [
"pin",
"python2",
"python2-argparse"
]
},
"pintool2-debug": {
"version": "5.1c1af91-4",
"description": "Detached debugging symbols for pintool2",
"dependencies": []
},
"pintool-debug": {
"version": "24.d538a79-3",
"description": "Detached debugging symbols for pintool",
"dependencies": []
},
"pip3line": {
"version": "2:92.5e27195-3",
"description": "The Swiss army knife of byte manipulation.",
"dependencies": [
"qt4",
"python2",
"python",
"gcc-libs",
"openssl",
"distorm",
"xdg-utils"
]
},
"pipal": {
"version": "3.4.0.r9.g392f0aa-3",
"description": "A password analyser.",
"dependencies": [
"git",
"ruby"
]
},
"pipeline": {
"version": "19.f4935c9-1",
"description": "Designed to aid in targeted brute force password cracking attacks.",
"dependencies": []
},
"pirana": {
"version": "0.3.1-6",
"description": "Exploitation framework that tests the security of a email content filter.",
"dependencies": [
"perl",
"perl-mime-lite"
]
},
"pivotsuite": {
"version": "20.5640666-5",
"description": "A portable, platform independent and powerful network pivoting toolkit.",
"dependencies": [
"python",
"python-ntlm-auth",
"python-six"
]
},
"pixd": {
"version": "9.f49add4-1",
"description": "Colourful visualization tool for binary files.",
"dependencies": []
},
"pixd-debug": {
"version": "9.f49add4-1",
"description": "Detached debugging symbols for pixd",
"dependencies": []
},
"pixload": {
"version": "87.a8f58a7-3",
"description": "Image Payload Creating/Injecting tools.",
"dependencies": [
"perl",
"perl-gd",
"perl-image-exiftool",
"perl-string-crc32"
]
},
"pkcrack": {
"version": "1.2.2-2",
"description": "A PkZip encryption cracker.",
"dependencies": []
},
"pkgcheck-arch": {
"version": "0.1.4-4",
"description": "A bashate fork for Arch Linux's PKGBUILDs.",
"dependencies": [
"python-pbr"
]
},
"pkinittools": {
"version": "13.0f0cfa5-1",
"description": "Tools for Kerberos PKINIT and relaying to AD CS.",
"dependencies": [
"python",
"python-oscrypto",
"python-pyasn1",
"python-minikerberos",
"python-asysocks",
"impacket"
]
},
"pkt2flow": {
"version": "69.868a2e8-1",
"description": "A simple utility to classify packets into flows.",
"dependencies": [
"libpcap"
]
},
"plasma-disasm": {
"version": "922.ec7df9b-8",
"description": "An interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.",
"dependencies": [
"python",
"python-capstone",
"python-pyelftools",
"python-pefile",
"python-msgpack",
"python-pefile",
"python-pyqt4",
"python-nose"
]
},
"plasma-disasm-debug": {
"version": "922.ec7df9b-8",
"description": "Detached debugging symbols for plasma-disasm",
"dependencies": []
},
"plcscan": {
"version": "0.1-6",
"description": "This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.",
"dependencies": [
"python2"
]
},
"plecost": {
"version": "104.4895e34-6",
"description": "Wordpress finger printer Tool.",
"dependencies": [
"python",
"python-lxml",
"python-termcolor",
"python-aiohttp",
"python-simplejson",
"python-chardet",
"python-beautifulsoup4",
"python-sphinx_rtd_theme"
]
},
"plown": {
"version": "13.ccf998c-4",
"description": "A security scanner for Plone CMS.",
"dependencies": [
"python2"
]
},
"plumber.py": {
"version": "18.3f1be68-6",
"description": "A python implementation of a grep friendly ftrace wrapper.",
"dependencies": [
"python",
"python-termcolor"
]
},
"plutil": {
"version": "1.6-1",
"description": "Converts .plist files between binary and UTF-8 (editable) text formats.",
"dependencies": [
"perl"
]
},
"pmacct": {
"version": "1:v1.7.6.r1540.gf00d2e5-1",
"description": "Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry].",
"dependencies": [
"libpcap",
"zeromq",
"rabbitmq",
"mariadb",
"geoip"
]
},
"pmacct-debug": {
"version": "1:v1.7.6.r1540.gf00d2e5-1",
"description": "Detached debugging symbols for pmacct",
"dependencies": []
},
"pmap": {
"version": "1.10-4",
"description": "Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic).",
"dependencies": []
},
"pmapper": {
"version": "82.91d2e60-6",
"description": "A tool for quickly evaluating IAM permissions in AWS.",
"dependencies": [
"python",
"python-dateutil",
"python-botocore",
"python-pydot",
"python-tqdm",
"python-packaging"
]
},
"pmcma": {
"version": "1.00-3",
"description": "Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).",
"dependencies": [
"flex",
"bison"
]
},
"pmdump": {
"version": "1.2-2",
"description": "A tool that lets you dump the memory contents of a process to a file without stopping the process.",
"dependencies": []
},
"pngcheck": {
"version": "3.0.3-1",
"description": "Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data.",
"dependencies": [
"libpng"
]
},
"pnscan": {
"version": "1.14.1-1",
"description": "A parallel network scanner that can be used to survey TCP network services.",
"dependencies": []
},
"pocketsphinx": {
"version": "5prealpha-1",
"description": "Lightweight speech recognition engine, specifically tuned for handheld and mobile devices, though it works equally well on the desktop.",
"dependencies": [
"sphinxbase",
"gst-plugins-base-libs"
]
},
"pocsuite": {
"version": "430.877d1b1-4",
"description": "An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team.",
"dependencies": [
"python2",
"python2-pyopenssl",
"python2-lxml",
"python2-requests",
"python2-setuptools"
]
},
"poison": {
"version": "1.5.41-1",
"description": "A fast, asynchronous syn and udp scanner.",
"dependencies": []
},
"polenum": {
"version": "22.0f70e65-3",
"description": "A python script to extract the password policy information from a windows machine.",
"dependencies": [
"impacket",
"python2"
]
},
"poly": {
"version": "52.4e6f189-4",
"description": "Polymorphic webshells.",
"dependencies": [
"python2",
"python2-argparse"
]
},
"polyswarm": {
"version": "3.11.0-4",
"description": "An interface to the public and private PolySwarm APIs.",
"dependencies": [
"python",
"python-virtualenv"
]
},
"pompem": {
"version": "141.3ebe768-8",
"description": "A python exploit tool finder.",
"dependencies": [
"python",
"python-requests"
]
},
"poracle": {
"version": "68.dcc00b0-8",
"description": "A tool for demonstrating padding oracle attacks.",
"dependencies": [
"ruby",
"ruby-httparty"
]
},
"portia": {
"version": "39.2e6e608-5",
"description": "Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.",
"dependencies": [
"python2",
"python2-pyasn1",
"python2-pymysql",
"python2-argparse",
"python2-tabulate",
"python2-termcolor",
"python2-python-nmap",
"python2-netaddr",
"python2-dnspython",
"python2-impacket",
"volatility3",
"python2-xmltodict",
"python2-pysmb",
"ntdsxtract",
"pymssql",
"python2-pyopenssl",
"python2-setuptools"
]
},
"portmanteau": {
"version": "1.0-3",
"description": "An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface.",
"dependencies": [
"openssl",
"sqlite"
]
},
"portmanteau-debug": {
"version": "1.0-3",
"description": "Detached debugging symbols for portmanteau",
"dependencies": []
},
"portspoof": {
"version": "152.89d5ecc-1",
"description": "This program's primary goal is to enhance OS security through a set of new techniques.",
"dependencies": [
"gcc-libs"
]
},
"portspoof-debug": {
"version": "152.89d5ecc-1",
"description": "Detached debugging symbols for portspoof",
"dependencies": []
},
"postenum": {
"version": "125.3188f0a-1",
"description": "Clean, nice and easy tool for basic/advanced privilege escalation techniques.",
"dependencies": [
"bash"
]
},
"postman": {
"version": "10.20-1",
"description": "Build, test, and document your APIs faster.",
"dependencies": [
"libxss",
"nss",
"gtk3"
]
},
"posttester": {
"version": "0.1-3",
"description": "A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.",
"dependencies": [
"java-environment"
]
},
"powercloud": {
"version": "21.0928303-1",
"description": "Deliver powershell payloads via DNS TXT via CloudFlare using PowerShell.",
"dependencies": []
},
"powerfuzzer": {
"version": "1_beta-8",
"description": "Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others.",
"dependencies": [
"python2",
"wxpython",
"python2-utidylib"
]
},
"powerlessshell": {
"version": "115.2a87166-3",
"description": "Run PowerShell command without invoking powershell.exe.",
"dependencies": [
"python2"
]
},
"powermft": {
"version": "5.76574543-1",
"description": "Powerful commandline $MFT record editor.",
"dependencies": [
"wine",
"wine_gecko",
"wine-mono"
]
},
"powerops": {
"version": "32.13fe55b-1",
"description": "PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell \"easier\".",
"dependencies": []
},
"powershdll": {
"version": "72.62cfa17-1",
"description": "Run PowerShell with rundll32. Bypass software restrictions.",
"dependencies": [
"git"
]
},
"powersploit": {
"version": "591.d943001-1",
"description": "A PowerShell Post-Exploitation Framework.",
"dependencies": []
},
"powerstager": {
"version": "14.0149dc9-8",
"description": "A payload stager using PowerShell.",
"dependencies": [
"python",
"python-names",
"mingw-w64-gcc"
]
},
"pown": {
"version": "332.0e32edf-1",
"description": "Security testing and exploitation toolkit built on top of Node.js and NPM.",
"dependencies": [
"nodejs"
]
},
"ppee": {
"version": "1.12-1",
"description": "A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details.",
"dependencies": []
},
"ppfuzz": {
"version": "31.80982ec-1",
"description": "A fast tool to scan client-side prototype pollution vulnerability written in Rust.",
"dependencies": []
},
"ppmap": {
"version": "v1.2.0.r15.g9426af6-1",
"description": "A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.",
"dependencies": [
"glibc"
]
},
"ppscan": {
"version": "0.3-2",
"description": "Yet another port scanner with HTTP and FTP tunneling support.",
"dependencies": []
},
"pr0cks": {
"version": "1:20.bcfcf2d-1",
"description": "python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target.",
"dependencies": [
"python2",
"python2-dnslib",
"iptables"
]
},
"prads": {
"version": "1132.e631f4f-3",
"description": "A \"Passive Real-time Asset Detection System\".",
"dependencies": [
"python-docutils",
"libpcap"
]
},
"praeda": {
"version": "49.b0b17d3-2",
"description": "An automated data/information harvesting tool designed to gather critical information from various embedded devices.",
"dependencies": [
"perl",
"perl-io-socket",
"perl-net-ssleay",
"perl-net-snmp",
"perl-netaddr-ip",
"perl-html-tableextract",
"perl-http-cookies",
"perl-html-tagparser",
"perl-uri-fetch",
"perl-crypt-ssleay"
]
},
"pre2k": {
"version": "22.be66190-4",
"description": "Query for existence of pre-windows 2000 computer objects which can be leveraged to gain a foothold in a target domain.",
"dependencies": [
"python",
"impacket-ba",
"python-ldap3",
"python-pyasn1",
"python-rich"
]
},
"preeny": {
"version": "110.aaef77f-1",
"description": "Some helpful preload libraries for pwning stuff.",
"dependencies": [
"ding-libs",
"libseccomp"
]
},
"pret": {
"version": "108.a04bd04-5",
"description": "Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.",
"dependencies": [
"python",
"python-pysnmp"
]
},
"princeprocessor": {
"version": "1:132.bffda8c-1",
"description": "Standalone password candidate generator using the PRINCE algorithm.",
"dependencies": [
"lib32-glibc"
]
},
"procdump": {
"version": "63.5f23548-1",
"description": "Generate coredumps based off performance triggers.",
"dependencies": [
"gdb"
]
},
"proctal": {
"version": "482.67bf7e8-1",
"description": "Provides a command line interface and a C library to manipulate the address space of a running program on Linux.",
"dependencies": [
"keystone",
"capstone"
]
},
"procyon": {
"version": "0.6-1",
"description": "A suite of Java metaprogramming tools focused on code generation and analysis.",
"dependencies": [
"java-environment"
]
},
"profuzz": {
"version": "9.aa6dded-4",
"description": "Simple PROFINET fuzzer based on Scapy.",
"dependencies": [
"python2",
"python2-pyqt4",
"python2-gnuplot",
"python2-pyx",
"python2-scapy",
"python2-pycryptodome",
"tcpdump",
"graphviz"
]
},
"prometheus-firewall": {
"version": "176.a316d66-9",
"description": "A Firewall analyzer written in ruby",
"dependencies": [
"ruby"
]
},
"promiscdetect": {
"version": "1.0-2",
"description": "Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer.",
"dependencies": []
},
"propecia": {
"version": "2-4",
"description": "A fast class scanner that scans for a specified open port with banner grabbing",
"dependencies": []
},
"protosint": {
"version": "26.1ee6ee4-7",
"description": "Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses.",
"dependencies": [
"python",
"python-requests"
]
},
"protos-sip": {
"version": "2-4",
"description": "SIP test suite.",
"dependencies": []
},
"prowler": {
"version": "1:5671.8a144a404-1",
"description": "Tool for AWS security assessment, auditing and hardening.",
"dependencies": [
"bash",
"aws-cli"
]
},
"proxenet": {
"version": "712.67fc6b5-5",
"description": "THE REAL hacker friendly proxy for web application pentests.",
"dependencies": [
"mbedtls",
"lua",
"ruby",
"python3",
"python2"
]
},
"proxify": {
"version": "712.b9c62cc-1",
"description": "Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.",
"dependencies": []
},
"proxify-debug": {
"version": "712.b9c62cc-1",
"description": "Detached debugging symbols for proxify",
"dependencies": []
},
"proxmark": {
"version": "2413.61163344-1",
"description": "A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.",
"dependencies": [
"libusb",
"perl",
"qt4",
"termcap",
"pcsclite"
]
},
"proxybroker2": {
"version": "408.644e7dc-3",
"description": "Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS.",
"dependencies": [
"python",
"python-aiohttp",
"python-aiodns",
"python-attrs",
"python-maxminddb",
"python-cachetools"
]
},
"proxycheck": {
"version": "0.1-4",
"description": "This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver.",
"dependencies": [
"perl",
"perl-io-socket"
]
},
"proxyp": {
"version": "2013-6",
"description": "Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.",
"dependencies": [
"perl",
"perl-ip-country",
"perl-libwww"
]
},
"proxyscan": {
"version": "0.3-4",
"description": "A security penetration testing tool to scan for hosts and ports through a Web proxy server.",
"dependencies": [
"perl",
"perl-libwww",
"perl-lwp-useragent-proxyany"
]
},
"ps1encode": {
"version": "41.68d7778-6",
"description": "A tool to generate and encode a PowerShell based Metasploit payloads.",
"dependencies": [
"ruby",
"metasploit"
]
},
"pscan": {
"version": "1.3-4",
"description": "A limited problem scanner for C source files",
"dependencies": []
},
"pshitt": {
"version": "23.dae7931-2",
"description": "A lightweight fake SSH server designed to collect authentication data sent by intruders.",
"dependencies": [
"python2",
"python2-paramiko",
"python2-daemon"
]
},
"pspy": {
"version": "159.2312eed-4",
"description": "Monitor linux processes without root permissions.",
"dependencies": []
},
"pstoreview": {
"version": "1.0-5",
"description": "Lists the contents of the Protected Storage.",
"dependencies": []
},
"ptf": {
"version": "1517.74f58d6-4",
"description": "The Penetration Testers Framework: Way for modular support for up-to-date tools.",
"dependencies": [
"python",
"python-pexpect"
]
},
"pth-toolkit": {
"version": "7.3641cdc-2",
"description": "Modified version of the passing-the-hash tool collection made to work straight out of the box.",
"dependencies": []
},
"pulledpork": {
"version": "397.5ccf5c5-4",
"description": "Snort rule management.",
"dependencies": [
"perl",
"perl-lwp-protocol-https",
"perl-crypt-ssleay",
"perl-bytes-random-secure"
]
},
"pulsar": {
"version": "55.3c61178-7",
"description": "Protocol Learning and Stateful Fuzzing.",
"dependencies": [
"python",
"cuckoo",
"python-pygraphviz",
"python-levenshtein",
"python-progressbar",
"python-numpy",
"python-twisted"
]
},
"punk": {
"version": "9.c2bc420-5",
"description": "A post-exploitation tool meant to help network pivoting from a compromised unix box.",
"dependencies": [
"python"
]
},
"punter": {
"version": "45.97b7bed-4",
"description": "Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare.",
"dependencies": [
"python2",
"python2-argparse",
"python2-requests",
"python2-dnspython",
"python2-beautifulsoup4",
"python2-python-whois",
"python2-ipwhois",
"python2-configparser",
"python2-api-dnsdumpster",
"python2-ipaddr",
"python2-future",
"python2-lxml",
"python2-shodan"
]
},
"pupy": {
"version": "2988.4b78dc58-1",
"description": "Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python.",
"dependencies": [
"libffi",
"python",
"tcpdump",
"python2-rpyc",
"python2-pycryptodome",
"python2-pefile",
"python2-pyaml",
"python2-rsa",
"python2-netaddr",
"python2-ecdsa",
"python2-paramiko",
"python2-tinyec",
"python2-psutil",
"python2-netifaces",
"python2-pylzma",
"python2-colorama",
"python2-mss",
"python2-pyopenssl",
"python2-scapy",
"python2-pyuv",
"python2-dnslib",
"python2-http-parser",
"python2-cerberus",
"python2-logutils",
"python2-secretstorage",
"python2-pygments",
"python2-requests",
"python2-tornado",
"python2-poster",
"python2-win_inet_pton",
"python2-scandir",
"python2-msgpack",
"python2-hexdump",
"python2-m2crypto",
"python2-fuse",
"python2-defusedxml",
"python2-keyboard",
"python2-dateparser",
"python2-puttykeys",
"python2-pyelftools",
"python2-filemagic",
"python2-xattr",
"python2-flake8",
"python2-flake8-per-file-ignores",
"python2-pypykatz",
"python2-tzlocal",
"python2-regex",
"python2-pyaes",
"impacket"
]
},
"pureblood": {
"version": "37.2c5ce07-1",
"description": "A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter.",
"dependencies": [
"python",
"python-colorama",
"python-requests",
"python-python-whois",
"python-dnspython",
"python-beautifulsoup4",
"python-shodan",
"wpscan"
]
},
"puredns-debug": {
"version": "v2.1.1.r2.gd823415-1",
"description": "Detached debugging symbols for puredns",
"dependencies": []
},
"puredns": {
"version": "v2.1.1.r2.gd823415-1",
"description": "Fast domain resolver and subdomain bruteforcing with accurate wildcard filtering.",
"dependencies": [
"massdns"
]
},
"pwcrack": {
"version": "368.b6fba8a-3",
"description": "Password hash automatic cracking framework.",
"dependencies": [
"ruby",
"ruby-bundler"
]
},
"pwd-hash": {
"version": "2.0-2",
"description": "A password hashing tool that use the crypt function to generate the hash of a string given on standard input.",
"dependencies": []
},
"pwdlogy": {
"version": "14.8b92bcf-6",
"description": "A target specific wordlist generating tool for social engineers and security researchers.",
"dependencies": [
"python3"
]
},
"pwdlyser": {
"version": "136.483b9bc-2",
"description": "Python-based CLI Password Analyser (Reporting Tool).",
"dependencies": [
"python",
"python-argparse"
]
},
"pwdump": {
"version": "7.1-6",
"description": "Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.",
"dependencies": []
},
"pwfuzz-rs-debug": {
"version": "v0.2.0.r0.g9ee3ed4-1",
"description": "Detached debugging symbols for pwfuzz-rs",