Public catalog

BlackArch Tools

A collaborative catalog of tools with search, history, comments, and favorites.

2840 tools
Page 1 of 48
Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.
v263.2d723aeπŸ•ΈοΈ Webapp0 comments0 favorites
A hop enumeration tool.
v1.5πŸ“Š Scanner0 comments0 favorites
Tiny free proxy server.
v0.9.5πŸ”€ Proxy0 comments0 favorites
Tiny free proxy server.
v0.8.13πŸͺŸ Windows0 comments0 favorites
Recursive Zip archive bomb.
v42πŸ’₯ Dos0 comments0 favorites
Auto Scanning to SSL Vulnerability.
v140.cb24c4eπŸ“Š Scanner0 comments0 favorites
ActionScript ByteCode Disassembler.
v4.2738809πŸ”© Disassembler0 comments0 favorites
Network Protocols Sniffer.
vv2.8.1.r0.g313f550πŸ‘ƒ Sniffer0 comments0 favorites
Bypassing WAF by abusing SSL/TLS Ciphers.
v7.c28f98eπŸ•ΈοΈ Webapp0 comments0 favorites
A password dictionary attack tool that targets windows authentication via the SMB protocol.
v0.2.1πŸ”“ Cracker0 comments0 favorites
A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface.
v1.11☎️ Voip0 comments0 favorites
Active Directory ACL exploitation with BloodHound.
v4.81480cc⚑ Exploitation0 comments0 favorites
An LDAP based Active Directory user and group enumeration tool.
v89.5626e8aπŸ—ΊοΈ Recon0 comments0 favorites
Active Directory audit tool that extract data from Bloodhound to uncover security weaknesses and generate an HTML report
vv1.8.1.r0.g6467f51πŸ—ΊοΈ Recon0 comments0 favorites
Active Directory Assessment and Privilege Escalation Script.
v43.4d0b9ffπŸͺŸ Windows0 comments0 favorites
Extensible post-exploitation and adversarial emulation framework.
v727.6605760⚑ Exploitation0 comments0 favorites
An Active Directory environments pentest tool complementary to existing ones like NetExec.
v0.0.4.r0.g8a1a243🌐 Networking0 comments0 favorites
A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
v36.fbbe14d⚑ Exploitation0 comments0 favorites
AD Explorer snapshot parser.
v142.b8dde33πŸ—ΊοΈ Recon0 comments0 favorites
Simple admin panel finder for php,js,cgi,asp and aspx admin panels.
vv1.0.3.r3.g46acf19πŸ•ΈοΈ Webapp0 comments0 favorites
Python3 tool to perform password spraying against Microsoft Online service using various methods.
v6.3d7745dπŸ”“ Cracker0 comments0 favorites
Active Directory Integrated DNS dumping by any authenticated user.
vv1.4.0.r1.g95adaf8πŸ—ΊοΈ Recon0 comments0 favorites
ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
v0.1🎭 Spoof0 comments0 favorites
This python script looks for a large amount of possible administrative interfaces on a given site.
v0.1πŸ•ΈοΈ Webapp0 comments0 favorites
winPEAS, but for Active Directory.
v1.3.0.r15.g0bfcedcπŸͺŸ Windows0 comments0 favorites
A tool to find AES key in RAM.
v1.0.1πŸ”“ Cracker0 comments0 favorites
A tool to find AES key in RAM.
v1.0πŸ”“ Cracker0 comments0 favorites
Reads data from stdin and outputs encrypted or decrypted results to stdout.
v2.4fπŸ” Crypto0 comments0 favorites
A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.
v0.7πŸšͺ Backdoor0 comments0 favorites
An extensible open format for the storage of disk images and related forensic information.
v3.7.22πŸ”¬ Forensic0 comments0 favorites
A gadget finder and a ROP-Chainer tool for x86 platforms.
v1.1πŸͺŸ Windows0 comments0 favorites
A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
v0.2πŸ”“ Cracker0 comments0 favorites
Bruteforce commandline buffer overflows, linux, aggressive arguments.
v51.c032446⚑ Exploitation0 comments0 favorites
A packet inspection engine with capabilities of learning without any human intervention.
v2.0.1🌐 Networking0 comments0 favorites
A tool to create aff-images.
v3.3.0πŸ”¬ Forensic0 comments0 favorites
Python 3 DNS asynchronous brute force utility.
vv0.3.2.r0.ge773a4cπŸ—ΊοΈ Recon0 comments0 favorites
A GUI front-end to dd/dc3dd designed for easily creating forensic images.
v2.0.0πŸ”¬ Forensic0 comments0 favorites
A modification of aireplay that allows for a DoS of the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. [Tool in Spanish]
v0.1πŸ“‘ Wireless0 comments0 favorites
Multi-use bash script for Linux systems to audit wireless networks.
vv11.61.r0.gd7e2423πŸ“‘ Wireless0 comments0 favorites
Get (wireless) clients and access points.
v5.b83f11dπŸ“‘ Wireless0 comments0 favorites
A script to simplify the use of aircrack-ng tools.
v45.0a122eeπŸ“‘ Wireless0 comments0 favorites
A tool for generic packet injection on an 802.11 network.
v1.4πŸ“‘ Wireless0 comments0 favorites
Host code for AirspyHF+ SDR.
v1.6.8.r63.g30e0422πŸ“» Radio0 comments0 favorites
A command-line fuzzer for the Apache JServ Protocol (ajp13).
v0.6🎯 Fuzzer0 comments0 favorites
A SQLi exploitation framework in Python.
v0.1.r11.gd500657πŸ•ΈοΈ Webapp0 comments0 favorites
A vhost discovery tool that scrapes various web applications.
v1.0πŸ“Š Scanner0 comments0 favorites
Generates permutations, alterations and mutations of subdomains and then resolves them.
v78.6728272πŸ—ΊοΈ Recon0 comments0 favorites
Next-generation tool for assisting network penetration testing.
v5.4πŸ“Š Scanner0 comments0 favorites
In-depth subdomain enumeration written in Go.
vv5.0.1.r1.g61f53ccπŸ“Š Scanner0 comments0 favorites
Reflective PE packer.
vv3.1.r2.gf6eb2dc01 Binary0 comments0 favorites
Yet another tool for analysing binaries.
vv2.9.11.r4.g3e36c5201 Binary0 comments0 favorites
Parse the MFT file from an NTFS filesystem.
vv3.1.1.0.r0.gd82bc98πŸ”¬ Forensic0 comments0 favorites
Analyze digital signature of PE file.
v0.0.0.5πŸͺŸ Windows0 comments0 favorites
An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications.
v7fd3a2c.r0.g7fd3a2cπŸ“± Mobile0 comments0 favorites
Reverse engineering, Malware and goodware analysis of Android applications and more.
v3.3.501 Binary0 comments0 favorites
A python tool to help in forensics analysis on android.
v8.522cfb4πŸ“± Mobile0 comments0 favorites
A tool for reverse engineering Android apk files.
v2.7.0↩️ Reversing0 comments0 favorites
Android C/C++ developer kit
vr29πŸ“± Mobile0 comments0 favorites