BlackArch is a complete Linux distribution for penetration testers and security researchers. It Is derived from ArchLinux and users can install BlackArch components individually or in groups directly on top of it. The toolset is distributed as an Arch Linux unofficial user repository so you can install BlackArch on top of an existing Arch Linux installation. Packages may be installed individually or by category. The constantly expanding repository currently includes over 1300 tools. All tools are thoroughly tested before being added to the codebase to maintain the quality of the repository. Here next tool in BlackArch

iaxflood20131208IAX flooder.
icmpquery1Send and receive ICMP queries for address mask and current time.
icmptx0.01IP over ICMP
iheartxor0.01iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
ikecrack1An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication
ikeprobelatestDetermine vulnerabilities in the PSK implementation of the VPN server.
ikeprober1.12Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors
ike-scan1.9A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers
inetsim1.2.4A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples
inguma0.1.1A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
intersect2.5Post-exploitation framework
intrace1.5Traceroute-like application piggybacking on existing TCP connections
inundator0.5An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
iodine0.6.0_rc1Lets you tunnel IPv4 data through a DNS server.
ipaudit1.0BETA2IPAudit monitors network activity on a network.
ipba232013IOS Backup Analyzer
ipscan3.2.1Angry IP scanner is a very fast IP address and port scanner.
irpas0.1Internetwork Routing Protocol Attack Suite.
isr-form1Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.
javasnoop1.1A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer
jboss-autopwn0.r1.3bc2d29A JBoss script for obtaining remote shell access
jbrofuzz2.1Web application protocol fuzzer that emerged from the needs of penetration testing.
jbrute97Open Source Security tool to audit hashed passwords.
jd-gui0.3.5A standalone graphical utility that displays Java source codes of .class files
jigsaw1.3A simple ruby script for enumerating information about a company’s employees. It is useful for Social Engineering or Email Phishing.
jnetmap0.5.3A network monitor of sorts
johnny20120424GUI for John the Ripper
john1.7.9John The Ripper – A fast password cracker jumbo-$_jumbover included$pkgname/
joomscan2012.03.10Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
js-beautify1.4.2This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by
jsql0.5A lightweight application used to find database information from a distant server.
jynx22An expansion of the original Jynx LD_PRELOAD rootkit
kautilya0.4.4Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices
keimpx0.2Tool to verify the usefulness of credentials across a network over SMB
killerbee73Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
kippo0.8A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.
kismet-earth20131215Various scripts to convert kismet logs to kml file to be used in Google Earth.http://
klogger1A keystroke logger for the NT-series of Windows.
kolkata3A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.
lanmap220131231Passive network mapping tool
lans1A Multithreaded asynchronous packet parsing/injecting arp spoofer.
laudanum0.8A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
lbd20130719Load Balancing detector
ldapenum20131209Enumerate domain controllers using LDAP.
leo4.11Literate programmer’s editor, outliner, and project manager
leroy-jenkins0.r1.c5f57d6A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
lfi-autopwn3A Perl script to try to gain code execution on a remote server via LFI
lft3.35A layer four traceroute implementing numerous other features
libewf20130416A library for support of the Expert Witness Compression Format EWF
linux-exploit-suggester0.r29.b8c82edA Perl script that tries to suggest exploits based OS version number
list-urls0.1Extracts links from webpage
lodowep1.2.1Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
loki0.2.7Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols
lsrtunnel0.2lsrtunnel spoofs connections using source routed packets.
lynis1.3.9An auditing tool for Unix specialists
magicrescue1.1.9Find and recover deleted files on block devices
magictree1.3A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation
make-pdf0.1.1This tool will embed javascript inside a PDF document
maltego3.3.0An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
malwaredetect0.1Submits a file’s SHA1 sum to VirusTotal to determine whether it is a known piece of malware
maskprocessor0.69A High-Performance word generator with a per-position configurable charset
masscan1TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes
matahari0.1.30A reverse HTTP shell to execute commands on remote machines behind firewalls.
mausezahn0.4A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
mbenum1.5.0Queries the master browser for whatever information it has registered.
mboxgrep0.7.9Mboxgrep is a small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
md5deep4.3Advanced checksum hashing tool
mdbtools0.7.1Utilities for viewing data and exporting schema from Microsoft Access Database files
mdcrack1.2MD4/MD5/NTLM1 hash cracker
mdk36WLAN penetration tool
medusa2.1.1A speedy, massively parallel, modular, login brute-forcer for network
memdump1.01Dumps system memory to stdout, skipping over holes in memory maps.
memfetch0.05bdumps any userspace process memory without affecting its execution
meshdeck2.04An addon to The Deck which allows multiple devices running The Deck to communicate via 802.15.4 Xbee and/or \
metacoretex0.8.0MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
metagoofil1.4bAn information gathering tool designed for extracting metadata of public documents
metasploit22396.21b146fAn open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits
metoscan5Tool for scanning the HTTP methods supported by a webserver. It works
mfcuk0.3.8MIFARE Classic Universal toolKit
mfoc0.10.6Mifare Classic Offline Cracker
mibble2.9.3Mibble is an open-source SNMP MIB parser or SMI parser written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
middler1A Man in the Middle tool to demonstrate protocol middling attacks.
minimysqlator0.5Mini MySqlat0r is a multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
miranda-upnp1.3A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
missidentify1A program to find Win32 applications
mitmap20131208Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.
mitmproxy0.8SSL-capable man-in-the-middle HTTP proxy
morxbrute1.01A customizable HTTP dictionary-based password cracking tool written in Perl
mssqlscan0.8.4A small multi-threaded tool that scans for Microsoft SQL Servers.
ms-sys2.2.0A tool to write Win9x-.. master boot records mbr under linux – RTM!
multiinjector0.3Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
multimac1.0.3Multiple MACs on an adapter


Please enter your comment!
Please enter your name here