Skip to main content

Information security software

The best professional software on information security and ethical hacking.

Subgraph OS

Subgraph believes that the best way to empower people to communicate and live freely is to develop technology that is secure, free, open-source, and verifiably trustworthy.... Read more

Qubes OS

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems.... Read more

IC Watch website

ICWATCH is a public database of mainly LinkedIn profiles of people in the United States Intelligence Community. The database was created by Transparency Toolkit and is hosted by WikiLeaks.... Read more


Automated Open Source Intelligence (OSINT) Tool... Read more

Charles Web Proxy

Charles is an HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet. This includes requests, responses and the HTTP headers (which contain the cookies and caching information).... Read more

Gnupg PGP

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite. GnuPG is compliant with RFC 4880, which is the IETF standards track specification of OpenPGP. Modern versions of PGP are interoperable with GnuPG and other OpenPGP-compliant systems.... Read more


KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms curre...... Read more

Keepass X

KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.... Read more


OllyDbg is a 32-bit assembler level analysing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free.... Read more

Immunity Debugger

The Immunity CANVAS pentesting tool can be used to test how vulerable your system really is. This hacking tool ships with purposely designed vulnerability exploitation modules that have been written to discover exploits. Immunity CANVAS provides a solution for any organization to have a concrete picture of their security profile.... Read more


IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger that offers so many features it is hard to describe them all.... Read more

GDB: The GNU Project Debugger

The GNU Debugger (GDB) is a portable debugger that runs on many Unix-like systems and works for many programming languages, including Ada, C, C++, Objective-C, Free Pascal, Fortran, Java and partially others.... Read more

NBT Scan

This is a command-line tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network, and this is a first step in finding of open shares. It is based on the functionality of the standard Windows tool nbtstat, but it operates on a range of addresses instead of just one. I wrote this tool because the existing tools either didn't do what I wanted or ran only on the Windows platform...... Read more


Netcat is a computer networking utility for reading from and writing to network connections using TCP or UDP.... Read more


Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.... Read more

THC Amap

Application Specific Scanner. Amap was the first next-generation scanning tool for pentesters. It attempts to identify applications even if they are running on a different port than normal.... Read more

Kansa PowerShell Incident Response

A Powershell incident response framework... Read more


Exploit Development : Payloads. Msfvenom is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance. msfvenom replaced both msfpayload and msfencode as of June 8th, 2015.... Read more


StegoTorus is a camouflage proxy for the Tor anonymity system. It masks the traffic from a Tor client to the entry point into the Tor onion routing such that it looks like ordinary HTML traffic. Therefore, it may help circumvent traffic classification as Tor.... Read more


Orbot is a free proxy app that empowers other apps to use the internet more securely.... Read more