BlackArch is a complete Linux distribution for penetration testers and security researchers. It Is derived from ArchLinux and users can install BlackArch components individually or in groups directly on top of it. The toolset is distributed as an Arch Linux unofficial user repository so you can install BlackArch on top of an existing Arch Linux installation. Packages may be installed individually or by category. The constantly expanding repository currently includes over 1300 tools. All tools are thoroughly tested before being added to the codebase to maintain the quality of the repository. Here some Tool on BlackArch :

Name Version Description Homepage
       
0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/
3proxy 0.7 Tiny free proxy server http://3proxy.ru/
3proxy-win32 0.7 3proxy tiny free proxy server http://3proxy.ru/
42zip 20131222 Recursive Zip archive bomb. http://blog.fefe.de/?ts
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
ace 1.1 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 20131208 ADM DNS spoofing tools – Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
admsnmp 0.1 ADM SNMP audit scanner.  
aesfix 1.0.1 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
aeskeyfind 1 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
afflib 3.7.1 An extensible open format for the storage of disk images and related forensic information http://www.afflib.org
against 20131208 A very fast ssh attacking script which includes a multithreaded port scanning module tcp connect for discovering possible targets and a multithreaded brute-forcing module which attacks parallel multiprocessing all discovered hosts or given ip-adresses from a list http://nullsecurity.net/tools/cracker.html
aimage 3.2.5 A program to create aff-images. http://www.afflib.org
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood-0.1.tar.gz.html
airgraph-ng 2364 Graphing tool for the aircrack suite http://www.aircrack-ng.org
airoscript 45.0a122ee Script to simplify the use of aircrack-ng tools http://midnightresearch.com/projects/wicrawl/
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/
airpwn 1.4 A tool for generic packet injection on an 802.11 network. http://airpwn.sourceforge.net
allthevhosts 1 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
android-sdk r22.3 Google Android SDK http://developer.android.com/sdk/index.html
android-sdk-platform-tools r19 Platform-Tools for Google Android SDK adb and fastboot http://developer.android.com/sdk/index.html
android-udev-rules 1.0.4 Android udev rules https://github.com/bbqlinux/android-udev-rules
arachni 0.4.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.
Home
arduino 1.0.5 Arduino SDK includes patched avrdude and librxtx http://arduino.cc/en/Main/Software
armitage 1132 A graphical cyber attack management tool for Metasploit http://www.fastandeasyhacking.com/
arpalert 2.0.12 Monitor ARP changes in ethernet networks http://www.arpalert.org/
arpoison 0.6 The UNIX arp cache update utility http://www.arpoison.net
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle MITM attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing APR attacks. http://arpon.sourceforge.net/
artillery 0.7.3 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system https://www.trustedsec.com/downloads/artillery/
asleap 2.2 Actively recover LEAP/PPTP passwords. http://www.willhackforsushi.com/Asleap.html
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. http://seclists.org/basics/2006/Sep/128
autopsy 2.24 A GUI for The Sleuth Kit. http://www.sleuthkit.org/autopsy
backdoor-factory 0.r33.879fcbd Patch win32/64 binaries with shellcode https://github.com/secretsquirrel/the-backdoor-factory
batctl 2013.4.0 B.A.T.M.A.N. advanced control and management tool http://www.open-mesh.net/
batman-adv 2013.4.0 batman kernel module, included upstream since .38 http://www.open-mesh.net/
bbqsql 1.2 SQL injection exploitation tool https://github.com/neohapsis/bbqsql
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities. http://www.aldeid.com/wiki/Bed
beef 0.4.4.8.11.gadde527 BeEF, the Browser Exploitation Framework – it is a penetration testing tool that focuses on the web browser http://beefproject.com/
beleth 0.r32.568c547 A Multi-threaded Dictionary based SSH cracker https://github.com/chokepoint/Beleth
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows http://sourceforge.net/projects/bfbtester/
bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address.
bing-ip2hosts
binwalk 1.2.2 A tool for searching a given binary image for embedded files http://code.google.com/p/binwalk/
binwally 0.r3.ca092a7 Binary and Directory tree comparison tool using the Fuzzy Hashing concept ssdeep https://github.com/bmaia/binwally
bios_memimage 1.2 A tool to dump RAM contents to disk aka cold boot attack. http://citp.princeton.edu/memory/code/
blackhash 0.2 Creates a filter from system hashes http://16s.us/blackhash/
bletchley 0.0.1 A collection of practical application cryptanalysis tools. https://code.google.com/p/bletchley/
blindelephant 6 A web application fingerprinter. Attempts to discover the version of a known web application by comparing static files at known locations http://blindelephant.sourceforge.net/
blindsql 1 Set of bash scripts for blind SQL injection attacks http://www.enye-sec.org/programas.html
bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt. http://packetstormsecurity.com/files/54024/bluebugger-0.1.tar.gz.html
bluelog 1.0.4 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode http://www.digifail.com/software/bluelog.shtml
bluepot 0.1 A Bluetooth Honeypot written in Java, it runs on Linux https://code.google.com/p/bluepot/
blueprint 0.1_3 A perl tool to identify Bluetooth devices. http://trifinite.org/trifinite_stuff_blueprinting.html
blueranger 1 A simple Bash script which uses Link Quality to locate Bluetooth device radios. http://www.hackfromacave.com/projects/blueranger.html
bluesnarfer 0.1 A bluetooth attacking tool http://www.alighieri.org/project.html
bob-the-butcher 0.7.1 A distributed password cracker package. http://btb.banquise.net/
braa 0.82 A mass snmp scanner http://s-tech.elsat.net.pl/braa/
braces 0.4 A Bluetooth Tracking Utility. http://braces.shmoo.com/
browser-fuzzer 3 Browser Fuzzer 3 http://www.krakowlabs.com/dev.html
brutessh 0.5 A simple sshd password bruteforcer using a wordlist, it’s very fast for internal networks. It’s multithreads. http://www.edge-security.com/edge-soft.php
brutus 2 One of the fastest, most flexible remote password crackers you can get your hands on. http://www.hoobie.net/brutus/
bsqlbf 2.6 Blind SQL Injection Brute Forcer. http://code.google.com/p/bsqlbf-v2/
bss 0.8 Bluetooth stack smasher / fuzzer http://www.secuobs.com/news/15022006-bss_0_8.shtml
bt_audit 0.1.1 Bluetooth audit http://www.betaversion.net/btdsd/download/
bt_audit 0.1.1 Bluetooth audit http://www.betaversion.net/btdsd/download/
btcrack 1.1 The world’s first Bluetooth Pass phrase PIN bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. http://www.nruns.com/_en/security_tools_btcrack.php
btscanner 2.1 Bluetooth device scanner. http://www.pentest.co.uk
bulk-extractor 1.3.1 Bulk Email and URL extraction tool http://afflib.org
bully 1.0.20 A wifi-protected-setup WPS brute force attack tool. http://code.google.com/p/bully/
bunny 0.93 A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. http://code.google.com/p/bunny-the-fuzzer/
burpsuite 1.5 An integrated platform for attacking web applications free edition. http://portswigger.net/burp/
canari 1 A transform framework for maltego http://www.canariproject.com
capstone 1 A lightweight multi-platform, multi-architecture disassembly framework. http://www.capstone-engine.org/index.html
carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. http://trifinite.org/trifinite_stuff_carwhisperer.html
casefile 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information http://www.paterva.com/web6/products/casefile.php

LEAVE A REPLY

Please enter your comment!
Please enter your name here