├── Download_Script.sh ├── README.md ├── Tools_non-git.txt └── list.txt /Download_Script.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | #Installer script. 3 | 4 | #Yes/No prompt. 5 | read -p "This script will install all of the tools included in list.txt - Do you wanna install them to your current directory? [Y/n] " -n 1 -r 6 | echo 7 | if [[ ! $REPLY =~ ^[Yy]$ ]] 8 | then 9 | [[ "$0" = "$BASH_SOURCE" ]] && exit 1 || return 1 # handle exits from shell or function but doesn't exit the interactive shell. 10 | fi 11 | 12 | #Checks for git. 13 | command -v git >/dev/null 2>&1 || { echo >&2 "You don't have git. Run 'apt-get install git' first."; exit 1; } 14 | 15 | #Clones tools from pack. 16 | for i in `cat list.txt`; do git clone --quiet "$i" && echo "$i downloaded successfully."; done 17 | 18 | #Tells the user what the script is doing. 19 | echo "Creating Catagorized folders..." 20 | 21 | #Makes directories. 22 | mkdir "Forensics" 23 | mkdir "General_Exploitation" 24 | mkdir "Hardware_Related" 25 | mkdir "Cracking" 26 | mkdir "Malware_Creation" 27 | mkdir "MitM" 28 | mkdir "Other" 29 | mkdir "Reverse_Engineering" 30 | mkdir "Stress_Testing" 31 | mkdir "Web_Server_Exploitation" 32 | mkdir "Wireless_Exploitation" 33 | 34 | #Tells the user what the script is doing. 35 | echo "Moving tools into said folders..." 36 | 37 | #Moves the tools to the correct folders. 38 | mv "ace-voip/" "MitM/" 39 | mv "AFE/" "Hardware_Related/" 40 | mv "aircrack-ng/" "Wireless_Exploitation/" 41 | mv "amap/" "Other/" 42 | mv "amun/" "MitM/" 43 | mv "arachni/" "Web_Server_Exploitation/" 44 | mv "armitage/" "General_Exploitation/" 45 | mv "Arsenal_X/" "Other/" 46 | mv "AsciiToDucky/" "Hardware_Related/" 47 | mv "AtEar/" "Wireless_Exploitation/" 48 | mv "atom-bombing/" "Malware_Creation/" 49 | mv "ATSCAN/" "Web_Server_Exploitation/" 50 | mv "autopsy/" "Forensics/" 51 | mv "ava/" "General_Exploitation/" 52 | mv "bashobfus/" "Other/" 53 | mv "beef/" "General_Exploitation/" 54 | mv "bettercap/" "MitM/" 55 | mv "binarypig/" "Reverse_Engineering/" 56 | mv "BinGoo/" "Web_Server_Exploitation/" 57 | mv "binwalk/" "Reverse_Engineering/" 58 | mv "BLE-Security/" "Hardware_Related/" 59 | mv "bohatei/" "Stress_Testing/" 60 | mv "brut3k1t/" "Cracking/" 61 | mv "Brutal/" "Hardware_Related/" 62 | mv "BypassCF/" "Web_Server_Exploitation/" 63 | mv "car-hacking-tools/" "Hardware_Related/" 64 | mv "CeWL/" "Cracking/" 65 | mv "chrome-decrypter/" "Cracking/" 66 | mv "chromebackdoor/" "Malware_Creation/" 67 | mv "cisco-auditing-tool/" "Hardware_Related/" 68 | mv "cisco-global-exploiter/" "Hardware_Related/" 69 | mv "cisco-ocs/" "Hardware_Related/" 70 | mv "cisco-torch/" "Hardware_Related/" 71 | mv "Cloakify/" "Malware_Creation/" 72 | mv "cloud-buster/" "Web_Server_Exploitation/" 73 | mv "cloudflare-resolver/" "Web_Server_Exploitation/" 74 | mv "clusterd/" "General_Exploitation/" 75 | mv "CMSmap/" "Web_Server_Exploitation/" 76 | mv "commix/" "Web_Server_Exploitation/" 77 | mv "crackle/" "Wireless_Exploitation/" 78 | mv "CVE-2016-5195/" "Hardware_Related/" 79 | mv "D-TECT/" "General_Exploitation/" 80 | mv "dawnscanner/" "Web_Server_Exploitation/" 81 | mv "dc-toolkit/" "Reverse_Engineering/" 82 | mv "dedsploit/" "General_Exploitation/" 83 | mv "DET/" "Other/" 84 | mv "dirb/" "Web_Server_Exploitation/" 85 | mv "discover/" "General_Exploitation/" 86 | mv "dnSpy/" "Reverse_Engineering/" 87 | mv "dnsrecon/" "Web_Server_Exploitation/" 88 | mv "domxssscanner/" "Web_Server_Exploitation/" 89 | mv "doork/" "Web_Server_Exploitation/" 90 | mv "dotdotpwn/" "Web_Server_Exploitation/" 91 | mv "Dracnmap/" "General_Exploitation/" 92 | mv "drammer/" "Hardware_Related/" 93 | mv "dripcap/" "MitM/" 94 | mv "droid-hunter/" "Hardware_Related/" 95 | mv "Dshell/" "Forensics/" 96 | mv "Empire/" "Malware_Creation/" 97 | mv "eschalot/" "Other/" 98 | mv "ettercap/" "MitM/" 99 | mv "evilgrade/" "MitM/" 100 | mv "EvilTool/" "Web_Server_Exploitation/" 101 | mv "exploitpack/" "General_Exploitation/" 102 | mv "extract-hashes/" "Cracking/" 103 | mv "F-Scrack/" "General_Exploitation/" 104 | mv "fbht-linux/" "Other/" 105 | mv "fbht/" "Other/" 106 | mv "fimap/" "Web_Server_Exploitation/" 107 | mv "findmyhash/" "Cracking/" 108 | mv "Findsploit/" "Other/" 109 | mv "FIR/" "Other/" 110 | mv "fireaway/" "General_Exploitation/" 111 | mv "foremost/" "Forensics/" 112 | mv "ghost-phisher/" "MitM/" 113 | mv "gitdigger/" "Cracking/" 114 | mv "grr/" "Forensics/" 115 | mv "hakkuframework/" "General_Exploitation/" 116 | mv "HasciiCam/" "Other/" 117 | mv "hashcat/" "Cracking/" 118 | mv "hashID/" "Cracking/" 119 | mv "HellRaiser/" "Web_Server_Exploitation/" 120 | mv "Hob0Rules/" "Cracking/" 121 | mv "holm/" "Cracking/" 122 | mv "HoneyPy/" "MitM/" 123 | mv "honssh/" "MitM/" 124 | mv "intelmq/" "Other/" 125 | mv "jboss-autopwn/" "General_Exploitation/" 126 | mv "JohnTheRipper/" "Cracking/" 127 | mv "joomscan/" "Web_Server_Exploitation/" 128 | mv "Kadabra/" "Web_Server_Exploitation/" 129 | mv "Kadimus/" "Web_Server_Exploitation/" 130 | mv "Kautilya/" "General_Exploitation/" 131 | mv "kippo/" "MitM/" 132 | mv "kismet/" "Wireless_Exploitation/" 133 | mv "kwetza/" "Malware_Creation/" 134 | mv "l0l/" "General_Exploitation/" 135 | mv "LFiFreak/" "Web_Server_Exploitation/" 136 | mv "LHF/" "General_Exploitation/" 137 | mv "libenom/" "Malware_Creation/" 138 | mv "liffy/" "Web_Server_Exploitation/" 139 | mv "lightbulb-framework/" "Web_Server_Exploitation/" 140 | mv "linset/" "Wireless_Exploitation/" 141 | mv "Linux_Exploit_Suggester/" "Other/" 142 | mv "malSploitBase/" "Reverse_Engineering/" 143 | mv "mdk3-master/" "Wireless_Exploitation/" 144 | mv "metasploit-framework/" "General_Exploitation/" 145 | mv "mimikatz/" "General_Exploitation/" 146 | mv "mitmproxy/" "MitM/" 147 | mv "Mobile-Security-Framework-MobSF/" "Hardware_Related/" 148 | mv "moloch/" "MitM/" 149 | mv "morpheus/" "MitM/" 150 | mv "mpc/" "Malware_Creation/" 151 | mv "naxsi/" "Other/" 152 | mv "nipe/" "Other/" 153 | mv "nishang/" "Malware_Creation/" 154 | mv "nmap/" "General_Exploitation/" 155 | mv "no-more-secrets/" "Other/" 156 | mv "NoSQLMap/" "Web_Server_Exploitation/" 157 | mv "onioff/" "Other/" 158 | mv "onionshare/" "Other/" 159 | mv "ophcrack/" "Cracking/" 160 | mv "OWASP-ZSC/" "Malware_Creation/" 161 | mv "passivedns/" "MitM/" 162 | mv "Pastebin-Scraper/" "Other/" 163 | mv "patator/" "General_Exploitation/" 164 | mv "pcileech/" "Hardware_Related/" 165 | mv "PenBox/" "General_Exploitation/" 166 | mv "php-webshells/" "Web_Server_Exploitation/" 167 | mv "pig/" "Other/" 168 | mv "pixiewps/" "Wireless_Exploitation/" 169 | mv "Pocsuite/" "Web_Server_Exploitation/" 170 | mv "Pompem/" "Other/" 171 | mv "ptf/" "General_Exploitation/" 172 | mv "pth-toolkit/" "Cracking/" 173 | mv "pwndsh/" "General_Exploitation/" 174 | mv "pwntools/" "Other/" 175 | mv "pybomber/" "Other/" 176 | mv "pyDirBuster/" "Web_Server_Exploitation/" 177 | mv "pyfiscan/" "Web_Server_Exploitation/" 178 | mv "pyminifier/" "Other/" 179 | mv "Pyrit/" "Wireless_Exploitation/" 180 | mv "python-pentest-tools/" "General_Exploitation/" 181 | mv "PythonObfuscator/" "Other/" 182 | mv "radare2/" "Reverse_Engineering/" 183 | mv "rainbowcrack/" "Cracking/" 184 | mv "RATDecoders/" "Reverse_Engineering/" 185 | mv "reaver-wps/" "Wireless_Exploitation/" 186 | mv "recon-ng/" "Other/" 187 | mv "rext/" "Hardware_Related" 188 | mv "Routerhunter-2.0/" "Hardware_Related/" 189 | mv "routersploit/" "Hardware_Related/" 190 | mv "rowhammer-test/" "Other/" 191 | mv "SCANNER-INURLBR/" "Web_Server_Exploitation/" 192 | mv "scansploit/" "Other/" 193 | mv "SecLists/" "Other/" 194 | mv "SharpMeter/" "Malware_Creation/" 195 | mv "shellnoob/" "Malware_Creation/" 196 | mv "shellshock-hunter-google/" "Web_Server_Exploitation/" 197 | mv "shellshock-hunter/" "Web_Server_Exploitation/" 198 | mv "shellsploit-framework/" "Malware_Creation/" 199 | mv "siege/" "Stress_Testing/" 200 | mv "Skype-Tool/" "Other/" 201 | mv "SkypeMass/" "Other/" 202 | mv "sleuthkit/" "Forensics/" 203 | mv "Smartphone-Pentest-Framework/" "Hardware_Related/" 204 | mv "Sn1per/" "Web_Server_Exploitation/" 205 | mv "social-engineer-toolkit/" "General_Exploitation/" 206 | mv "spade/" "Malware_Creation/" 207 | mv "sparta/" "General_Exploitation/" 208 | mv "spiderfoot/" "Web_Server_Exploitation/" 209 | mv "sploitego/" "Other/" 210 | mv "sqlchop/" "Other/" 211 | mv "sqlmap/" "Web_Server_Exploitation/" 212 | mv "sshwatch/" "MitM/" 213 | mv "stenographer/" "MitM/" 214 | mv "subbrute/" "Web_Server_Exploitation/" 215 | mv "tcpflow/" "MitM/" 216 | mv "TekDefense-Automater/" "Web_Server_Exploitation/" 217 | mv "termineter/" "Hardware_Related/" 218 | mv "the-backdoor-factory/" "Malware_Creation/" 219 | mv "The-Eye/" "Other/" 220 | mv "TheFatRat/" "Malware_Creation/" 221 | mv "torshammer/" "Stress_Testing/" 222 | mv "V3n0M-Scanner/" "Web_Server_Exploitation/" 223 | mv "vbscan/" "Web_Server_Exploitation/" 224 | mv "Veil-Evasion/" "Malware_Creation/" 225 | mv "volatility/" "Forensics/" 226 | mv "w3af/" "Web_Server_Exploitation/" 227 | mv "wafw00f/" "Web_Server_Exploitation/" 228 | mv "waybackpack/" "Other/" 229 | mv "weeman/" "Web_Server_Exploitation/" 230 | mv "weevely3/" "Web_Server_Exploitation/" 231 | mv "WhatWeb/" "Web_Server_Exploitation/" 232 | mv "wifijammer/" "Wireless_Exploitation/" 233 | mv "wifiphisher/" "Wireless_Exploitation/" 234 | mv "wifite/" "Wireless_Exploitation/" 235 | mv "Windows-Exploit-Suggester/" "Other/" 236 | mv "wpscan/" "Web_Server_Exploitation/" 237 | mv "xortool/" "Reverse_Engineering/" 238 | mv "xrdp/" "General_Exploitation/" 239 | mv "yersinia/" "Stress_Testing/" 240 | mv "zarp/" "General_Exploitation/" 241 | 242 | 243 | echo "Finished!" 244 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Git_Pentesting_Toolkit 2 | Exploit pack for pentesters and ethical hackers. 3 | **Git required to use installer bash script.** 4 | **Linux preferred** 5 | 6 |

Current number of tools : 196

7 | 8 | [![asciicast](https://asciinema.org/a/a4lud558ectt3bjur83ey5em2.png)](https://asciinema.org/a/a4lud558ectt3bjur83ey5em2?autoplay=1) 9 | -------------------------------------------------------------------------------- /Tools_non-git.txt: -------------------------------------------------------------------------------- 1 | These are tools which aren't obtainable with Git. 2 | You'll have to download these manually. :( 3 | I'll also include what I believe the tools would be catagorized under incase you decide to sort them. 4 | 5 | --Cracking-- 6 | https://labs.portcullis.co.uk/download/acccheck-0-2-1.tar.gz 7 | --Malware_Creation-- 8 | https://www.shellterproject.com/download/ 9 | --Reverse_Engineering-- 10 | http://flasm.sourceforge.net 11 | http://www.aspectsecurity.com/tools/javasnoop 12 | http://malzilla.sourceforge.net/ 13 | --Stress_Testing-- 14 | https://sourceforge.net/projects/t50/ 15 | --Other-- 16 | http://www.dosbox.com/download.php?main=1 17 | https://www.paterva.com/web7/buy/maltego-clients/maltego-ce.php 18 | --Web_Server_Exploitation-- 19 | https://code.google.com/archive/p/cms-explorer/downloads 20 | http://blindelephant.sourceforge.net/ 21 | --Wireless_Exploitation-- 22 | http://www.willhackforsushi.com/code/cowpatty/4.6/cowpatty-4.6.tgz 23 | -------------------------------------------------------------------------------- /list.txt: -------------------------------------------------------------------------------- 1 | git://git.kali.org/packages/ace-voip.git 2 | git://git.kali.org/packages/amap.git 3 | git://git.kali.org/packages/cisco-auditing-tool.git 4 | git://git.kali.org/packages/cisco-global-exploiter.git 5 | git://git.kali.org/packages/cisco-ocs.git 6 | git://git.kali.org/packages/cisco-torch.git 7 | https://bitbucket.org/LaNMaSteR53/recon-ng 8 | https://github.com/0xd4d/dnSpy 9 | https://github.com/1aN0rmus/TekDefense-Automater 10 | https://github.com/1N3/Findsploit 11 | https://github.com/1N3/Sn1per 12 | https://github.com/4shadoww/hakkuframework 13 | https://github.com/adaptivethreat/Empire 14 | https://github.com/AeonDave/doork 15 | https://github.com/aircrack-ng/aircrack-ng 16 | https://github.com/ajinabraham/Mobile-Security-Framework-MobSF 17 | https://github.com/AlisamTechnology/ATSCAN 18 | https://github.com/allfro/sploitego 19 | https://github.com/andresriancho/w3af 20 | https://github.com/aol/moloch 21 | https://github.com/appknox/AFE 22 | https://github.com/Arachni/arachni 23 | https://github.com/Aralhach/bashobfus 24 | https://github.com/b3mb4m/shellsploit-framework 25 | https://github.com/bartobri/no-more-secrets 26 | https://github.com/beefproject/beef 27 | https://github.com/BlackArch/rainbowcrack 28 | https://github.com/blindfuzzy/LHF 29 | https://github.com/bounteous/libenom 30 | https://github.com/BRDumps/extract-hashes 31 | https://github.com/BreakingMalwareResearch/atom-bombing 32 | https://github.com/byt3bl33d3r/chrome-decrypter 33 | https://github.com/byt3bl33d3r/pth-toolkit 34 | https://github.com/certsocietegenerale/FIR 35 | https://github.com/certtools/intelmq 36 | https://github.com/Cewlt/SkypeMass 37 | https://github.com/chaitin/sqlchop 38 | https://github.com/chinoogawa/fbht 39 | https://github.com/cloughrm/Pastebin-Scraper 40 | https://github.com/commixproject/commix 41 | https://github.com/cxdy/pybomber 42 | https://github.com/D35m0nd142/Kadabra 43 | https://github.com/danielmiessler/SecLists 44 | https://github.com/DanMcInerney/shellshock-hunter 45 | https://github.com/DanMcInerney/shellshock-hunter-google 46 | https://github.com/DanMcInerney/wifijammer 47 | https://github.com/darkoperator/dnsrecon 48 | https://github.com/ddos-defense/bohatei 49 | https://github.com/desaster/kippo 50 | https://github.com/devttys0/binwalk 51 | https://github.com/digininja/CeWL 52 | https://github.com/Dionach/CMSmap 53 | https://github.com/dloss/python-pentest-tools 54 | https://github.com/DoddyHackman/Arsenal_X 55 | https://github.com/DominikSchlecht/pyDirBuster 56 | https://github.com/dotfighter/torshammer 57 | https://github.com/dripcap/dripcap 58 | https://github.com/EgeBalci/The-Eye 59 | https://github.com/EnableSecurity/wafw00f 60 | https://github.com/endgameinc/binarypig 61 | https://github.com/epinna/weevely3 62 | https://github.com/Ettercap/ettercap 63 | https://github.com/evilsocket/bettercap 64 | https://github.com/ex0dus-0x/brut3k1t 65 | https://github.com/ex0dus-0x/dedsploit 66 | https://github.com/fgeek/pyfiscan 67 | https://github.com/foospidy/HoneyPy 68 | https://github.com/frdmn/findmyhash 69 | https://github.com/g0tmi1k/mpc 70 | https://github.com/gabrielrcouto/reaver-wps 71 | https://github.com/Gallopsled/pwntools 72 | https://github.com/gamelinux/passivedns 73 | https://github.com/GDSSecurity/Windows-Exploit-Suggester 74 | https://github.com/georgiaw/Smartphone-Pentest-Framework 75 | https://github.com/google/grr 76 | https://github.com/google/rowhammer-test 77 | https://github.com/google/stenographer 78 | https://github.com/googleinurl/SCANNER-INURLBR 79 | https://github.com/GouveaHeitor/nipe 80 | https://github.com/graniet/chromebackdoor 81 | https://github.com/HackerOrientado/BypassCF 82 | https://github.com/hahwul/droid-hunter 83 | https://github.com/hashcat/hashcat 84 | https://github.com/hatRiot/clusterd 85 | https://github.com/hatRiot/zarp 86 | https://github.com/hellman/xortool 87 | https://github.com/HiroshiManRise/anonym8 88 | https://github.com/Hood3dRob1n/BinGoo 89 | https://github.com/huntergregal/scansploit 90 | https://github.com/hvqzao/liffy 91 | https://github.com/Hypsurus/weeman 92 | https://github.com/infobyte/evilgrade 93 | https://github.com/j91321/rext 94 | https://github.com/jaromil/HasciiCam 95 | https://github.com/jh00nbr/Routerhunter-2.0 96 | https://github.com/JoeDog/siege 97 | https://github.com/JohnTroony/php-webshells 98 | https://github.com/JPaulMora/Pyrit 99 | https://github.com/jsvine/waybackpack 100 | https://github.com/juansacco/exploitpack 101 | https://github.com/Jumpst3r/AsciiToDucky 102 | https://github.com/k4m4/onioff 103 | https://github.com/kevthehermit/dc-toolkit 104 | https://github.com/kevthehermit/RATDecoders 105 | https://github.com/knownsec/Pocsuite 106 | https://github.com/korczis/foremost 107 | https://github.com/kurobeats/fimap 108 | https://github.com/lanjelot/patator 109 | https://github.com/leebaird/discover 110 | https://github.com/lhr0909/PythonObfuscator 111 | https://github.com/liftoff/pyminifier 112 | https://github.com/lightbulb-framework/lightbulb-framework 113 | https://github.com/luisgg/ophcrack 114 | https://github.com/m0nad/HellRaiser/ 115 | https://github.com/m3pt0r/l0l 116 | https://github.com/magnumripper/JohnTheRipper 117 | https://github.com/marshyski/sshwatch 118 | https://github.com/merculite/BLE-Security 119 | https://github.com/micahflee/onionshare 120 | https://github.com/mikeryan/crackle 121 | https://github.com/misterch0c/malSploitBase 122 | https://github.com/mitmproxy/mitmproxy 123 | https://github.com/mthbernardes/EvilTool 124 | https://github.com/nbs-system/naxsi 125 | https://github.com/nmap/nmap 126 | https://github.com/NORMA-Inc/AtEar 127 | https://github.com/OsandaMalith/LFiFreak/ 128 | https://github.com/P0cL4bs/Kadimus 129 | https://github.com/ParrotSec/car-hacking-tools 130 | https://github.com/PenturaLabs/Linux_Exploit_Suggester 131 | https://github.com/praetorian-inc/Hob0Rules 132 | https://github.com/psypanda/hashID 133 | https://github.com/r00t-3xp10it/morpheus 134 | https://github.com/radare/radare2 135 | https://github.com/rafael-santiago/pig 136 | https://github.com/ReclaimYourPrivacy/eschalot 137 | https://github.com/reverse-shell/routersploit 138 | https://github.com/reyammer/shellnoob 139 | https://github.com/rezasp/joomscan 140 | https://github.com/rezasp/vbscan 141 | https://github.com/rfunix/Pompem 142 | https://github.com/rsmudge/armitage 143 | https://github.com/s3inlc/holm 144 | https://github.com/SafeStack/ava 145 | https://github.com/SageHack/cloud-buster 146 | https://github.com/SageHack/cloudflare-resolver 147 | https://github.com/samratashok/Kautilya 148 | https://github.com/samratashok/nishang 149 | https://github.com/savio-code/ghost-phisher 150 | https://github.com/Screetsec/Brutal 151 | https://github.com/Screetsec/Dracnmap 152 | https://github.com/Screetsec/TheFatRat 153 | https://github.com/SECFORCE/sparta 154 | https://github.com/secretsquirrel/the-backdoor-factory/ 155 | https://github.com/securestate/termineter 156 | https://github.com/seifreed/dirb 157 | https://github.com/sensepost/DET 158 | https://github.com/sensepost/kwetza 159 | https://github.com/sensepost/xrdp 160 | https://github.com/shawarkhanethicalhacker/D-TECT 161 | https://github.com/simsong/tcpflow 162 | https://github.com/sleuthkit/autopsy 163 | https://github.com/sleuthkit/sleuthkit 164 | https://github.com/sophron/wifiphisher 165 | https://github.com/SpiderLabs/jboss-autopwn 166 | https://github.com/suraj-root/spade 167 | https://github.com/tcstool/fireaway 168 | https://github.com/tcstool/NoSQLMap 169 | https://github.com/TheRook/subbrute 170 | https://github.com/thesp0nge/dawnscanner 171 | https://github.com/timwr/CVE-2016-5195 172 | https://github.com/tnich/honssh 173 | https://github.com/tomac/yersinia 174 | https://github.com/trustedsec/ptf 175 | https://github.com/TryCatchHCF/Cloakify 176 | https://github.com/ufrisk/pcileech 177 | https://github.com/urbanadventurer/WhatWeb 178 | https://github.com/USArmyResearchLab/Dshell 179 | https://github.com/v3n0m-Scanner/V3n0M-Scanner 180 | https://github.com/vk496/linset 181 | https://github.com/volatilityfoundation/volatility 182 | https://github.com/vusec/drammer 183 | https://github.com/vvalien/SharpMeter 184 | https://github.com/WhiteMatt3r/Skype-Tool 185 | https://github.com/wi-fi-analyzer/mdk3-master 186 | https://github.com/wick2o/gitdigger 187 | https://github.com/wiire/pixiewps 188 | https://github.com/wireghoul/dotdotpwn 189 | https://github.com/wpscanteam/wpscan 190 | https://github.com/x3omdax/PenBox 191 | https://github.com/yaph/domxssscanner 192 | https://github.com/ysrc/F-Scrack 193 | https://github.com/zennro/fbht-linux 194 | https://github.com/zeroq/amun 195 | https://github.com/zscproject/OWASP-ZSC 196 | https://www.kismetwireless.net/kismet.git 197 | --------------------------------------------------------------------------------