BlackArch is a complete Linux distribution for penetration testers and security researchers. It Is derived from ArchLinux and users can install BlackArch components individually or in groups directly on top of it. The toolset is distributed as an Arch Linux unofficial user repository so you can install BlackArch on top of an existing Arch Linux installation. Packages may be installed individually or by category. The constantly expanding repository currently includes over 1300 tools. All tools are thoroughly tested before being added to the codebase to maintain the quality of the repository. Here next tools in BlackArch

eapmd5pass1.4An implementation of an offline dictionary attack against the EAP-MD5 protocolhttp://www.willhackforsushi.com/?page_id
easyfuzzer3.2A flexible fuzzer, not only for web, has a CSV output for efficient output analysis platform independant.http://www.mh-sec.de/downloads.html.en
edb0.9.18A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.http://www.codef00.com/projects.php#Debugger
eindeutig20050628_1Examine the contents of Outlook Express DBX email repository files forensic purposeshttp://www.jonesdykstra.com/
elettra-gui1Gui for the elettra crypto application.http://www.winstonsmith.info/julia/elettra/
elettra1Encryption utility by Julia Identityhttp://www.winstonsmith.info/julia/elettra/
enabler1attempts to find the enable password on a cisco system via brute force.http://packetstormsecurity.org/cisco/enabler.c
ent1Pseudorandom number sequence test.http://www.fourmilab.ch/random
enum4linux0.8.8A tool for enumerating information from Windows and Samba systems.http://labs.portcullis.co.uk/application/enum4linux/
enumiax1IAX enumeratorhttp://sourceforge.net/projects/enumiax/
enyelkm1.2Rootkit for Linux x86 kernels v2.6.http://www.enye-sec.org/programas.html
erase-registrationslatestIAX flooderhttp://www.hackingexposedvoip.com/
evilgrade2.0.0Modular framework that takes advantage of poor upgrade implementations by injecting fake updateshttp://www.infobyte.com.ar/developments.html
evilmaid1.01TrueCrypt loader backdoor to sniff volume passwordhttp://theinvisiblethings.blogspot.com
exploit-db1.6The Exploit Database EDB – an ultimate archive of exploits and vulnerable software – A collection of hackshttp://www.exploit-db.com
fakeap0.3.2Black Alchemy’s Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP’s cacophony of beacon frames.http://www.blackalchemy.to/project/fakeap/
fakedns0.1A regular-expression based python MITM DNS server with correct DNS request passthrough and \”Not Found\” responses.https://github.com/Crypt0s/FakeDns
fakemail1Fake mail server that captures e-mails as files for acceptance testing.http://sourceforge.net/projects/fakemail/
fang1.2A multi service threaded MD5 crackerhttps://github.com/evilsocket/fang
fern-wifi-cracker133WEP, WPA wifi cracker for wireless penetration testinghttp://code.google.com/p/fern-wifi-cracker/
fierce0.9.9A DNS scannerhttp://ha.ckers.org/fierce/
fiked0.0.5Fake IDE daemonhttp://www.roe.ch/FakeIKEd
fimap1A little tool for local and remote file inclusion auditing and exploitationhttp://code.google.com/p/fimap/
findmyhash1.1.2Crack different types of hashes using free online serviceshttp://code.google.com/p/findmyhash/
firewalk5An active reconnaissance network security toolhttp://packetfactory.openwall.net/projects/firewalk/
firmware-mod-kit99Modify firmware images without recompiling!http://code.google.com/p/firmware-mod-kit
flare0.6Flare processes an SWF and extracts all scripts from it.http://www.nowrap.de/flare.html
flasm1.62Disassembler tool for SWF bytecodehttp://www.nowrap.de/flasm.html
flawfinder1.27Searches through source code for potential security flawshttp://www.dwheeler.com/flawfinder
foremost1.5.7A console program to recover files based on their headers, footers, and internal data structureshttp://foremost.sourceforge.net/
fpdns0.9.3Program that remotely determines DNS server versionshttp://code.google.com/p/fpdns/
fport2Identify unknown open ports and their associated applications.http://www.foundstone.com/us/resources/proddesc/fport.htm
ftester1A tool designed for testing firewall filtering policies and Intrusion Detection System IDS capabilities.http://www.inversepath.com/ftester.html
ftp-fuzz20131208The master of all master fuzzing scripts specifically targeted towards FTP server sofwarehttp://nullsecurity.net/tools/fuzzer.html
ftpmap0.4scans remote FTP servers to identify what software and what versionshttp://wcoserver.googlecode.com/files/
fusil1.4Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment limit memory, environment variables, redirect stdout, etc., start network client or server, and create mangled fileshttp://bitbucket.org/haypo/fusil/wiki/Home
fuzzball20.7A little fuzzer for TCP and IP options. It sends a bunch of more orhttp://nologin.org/
fuzzdb1.09Attack and Discovery Pattern Database for Application Fuzz Testinghttps://code.google.com/p/fuzzdb/
fuzzdifflatestA simple tool designed to help out with crash analysis during fuzz testing. It selectively ‘un-fuzzes’ portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.http://vsecurity.com/resources/tool
g72x++1Decoder for the g72x++ codec.http://www.ps-auxw.de/
galleta20040505_1Examine the contents of the IE’s cookie files for forensic purposeshttp://www.jonesdykstra.com/
genlist20131216Generates lists of IP addresses. 
geoedgelatestThis little tools is designed to get geolocalization information of a host, it get the information from two sources maxmind and geoiptool. 
geoipgen0.4GeoIPgen is a country to IP addresses generator.http://code.google.com/p/geoipgen/
getsids0.0.1Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’.http://www.cqure.net/wp/getsids/
ghettotoothlatestGhettodriving for bluetoothhttp://www.oldskoolphreak.com/tfiles/ghettotooth.txt
ghost-phisher1.62GUI suite for phishing and penetration attackshttp://code.google.com/p/ghost-phisher
giskismet20110805A program to visually represent the Kismet data in a flexible manner.http://www.giskismet.org
golismero2Opensource web security testing frameworkhttps://github.com/golismero/golismero
goodork2.2A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.http://goo-dork.blogspot.com/
goofile1.5Command line filetype searchhttps://code.google.com/p/goofile/
goog-maillatestEnumerate domain emails from google.http://www.darkc0de.com/others/goog-mail.py
gooscan1.0.9A tool that automates queries against Google search appliances, but with a twist.http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid
gqrx2.2.0SDR receiver for Funcube Dongle, RTL-SDR, USRP and OsmoSDR deviceshttp://www.oz9aec.net/index.php/gnu-radio/gqrx-sdr
grabber0.1A web application scanner. Basically it detects some kind of vulnerabilities in your website.http://rgaucher.info/beta/grabber/
grepforrfi0.1Simple script for parsing web logs for RFIs and Webshells v1.2http://www.irongeek.com/downloads/grepforrfi.txt
grokevt0.4.1A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.http://code.google.com/p/grokevt/
gsa4.0.2OpenVAS web frontendhttp://www.openvas.org/
gsd1.2.2OpenVAS GUI frontendhttp://www.openvas.org/
guymager0.7.1A forensic imager for media acquisitionhttp://guymager.sourceforge.net/
gwtenum20131217Enumeration of GWT-RCP method calls.http://www.gdssecurity.com/l/t/d.php?k
hackersh0.2.0A shell for with Pythonect-like syntax, including wrappers for commonly used security toolshttp://www.hackersh.org/
halberd0.2.3Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.http://halberd.superadditive.com/
halcyon0.1A repository crawler that runs checksums for static files found within a given git repository.http://www.blackhatlibrary.net/Halcyon
hamster2.0.0Tool for HTTP session sidejacking.http://hamster.erratasec.com/
handle20140105An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..http://www.tarasco.org/security/handle/index.html
hashcat0.47A multithreaded cross platform hash cracker.http://hashcat.net/hashcat/
hashcat-utils0.9Utilites for Hashcathttp://hashcat.net/wiki/doku.php?id
hash-identifier1.1Identifies the different types of hashes used to encrypt data, especially passwordshttp://code.google.com/p/hash-identifier
hashtag0.41A python script written to parse and identify password hashes.https://github.com/SmeegeSec/HashTag
hcraft1.0.0HTTP Vuln Request Crafterhttp://sourceforge.net/projects/hcraft/
hexinject1.5A very versatile packet injector and sniffer that provides a command-line framework for raw network accesshttp://hexinject.sourceforge.net
hexorbase6A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL.https://code.google.com/p/hexorbase/
hidattack0.1HID Attack attacking HID host implementationshttp://mulliner.org/bluetooth/hidattack.php
honeyd1.6.7A small daemon that creates virtual hosts on a network.https://github.com/DataSoft/Honeyd/
hotpatch0.2Hot patches executables on Linux using .so file injectionhttp://www.selectiveintellect.com/hotpatch.html
hotspotter0.4Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.http://www.remote-exploit.org/?page_id
htexploit0.77A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication processhttp://www.mkit.com.ar/labs/htexploit/
htshells6b5d0dfSelf contained web shells and other attacks via .htaccess files.https://github.com/wireghoul/htshells
http-enum0.3A tool to enumerate the enabled HTTP methods supported on a webserver.https://www.thexero.co.uk/tools/http-enum/
http-fuzz20131215A simple http fuzzer.none
httping2.3.3A ‘ping’-like tool for http-requests.http://www.vanheusden.com/httping/
http-put1Simple http put perl script 
httprint301A web server fingerprinting tool.http://www.net-square.com/httprint.html
httprint-win32301A web server fingerprinting tool Windows binaries.http://net-square.com/httprint
hwk0.4Collection of packet crafting and wireless network flooding toolshttp://www.nullsecurity.net/
hydra7.6A very fast network logon cracker which support many different services.http://www.thc.org/thc-hydra/
hyenae0.36_1flexible platform independent packet generatorhttp://sourceforge.net/projects/hyenae/
hyperion1A runtime encrypter for 32-bit portable executables.http://nullsecurity.net/tools/binary.html
0/5 (0 Reviews)

LEAVE A REPLY

Please enter your comment!
Please enter your name here