BlackArch is a complete Linux distribution for penetration testers and security researchers. It Is derived from ArchLinux and users can install BlackArch components individually or in groups directly on top of it. The toolset is distributed as an Arch Linux unofficial user repository so you can install BlackArch on top of an existing Arch Linux installation. Packages may be installed individually or by category. The constantly expanding repository currently includes over 1300 tools. All tools are thoroughly tested before being added to the codebase to maintain the quality of the repository. Here next tools in BlackArch :

spiderpig-pdffuzzer0.1A javascript pdf fuzzerhttps://code.google.com/p/spiderpig-pdffuzzer/
spike2.9IMMUNITYsec’s fuzzer creation kit in Chttp://www.immunitysec.com/resources-freesoftware.shtml
spike-proxy148A Proxy for detecting vulnerabilities in web applicationshttp://www.immunitysec.com/resources-freesoftware.shtml
sploitctl0.9Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.https://github.com/BlackArch/sploitctl
sploitego1Maltego Penetration Testing Transformshttps://github.com/allfro/sploitego
spooftooph0.5Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sighthttp://www.hackfromacave.com/projects/spooftooph.html
sqid0.3A SQL injection digger.http://sqid.rubyforge.org/
sqlbrute1Brute forces data out of databases using blind SQL injection.http://www.justinclarke.com/archives/2006/03/sqlbrute.html
sqlmap1.0devAn automatic SQL injection tool developed in Pythonhttp://sqlmap.sourceforge.net
sqlninja0.2.5A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-endhttp://sqlninja.sourceforge.net/
sqlpat1.0.1This tool should be used to audit the strength of Microsoft SQL Server passwords offline.http://www.cqure.net/wp/sqlpat/
sqlping3SQL Server scanning tool that also checks for weak passwords using wordlists.http://www.sqlsecurity.com/downloads
sqlsus0.7.2An open source MySQL injection and takeover tool, written in perlhttp://sqlsus.sourceforge.net/
sshatter1.2Password bruteforcer for SSHhttp://www.nth-dimension.org.uk/downloads.php?id
ssh-privkey-crack0.3A SSH private key crackerhttps://code.google.com/p/lusas/
sshtrix0.0.2A very fast multithreaded SSH login crackerhttp://nullsecurity.net/tools/cracker.html
sslcatlatestSSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.http://www.bindshell.net/tools/sslcat
sslcaudit1.1Utility to perform security audits of SSL/TLS clientshttps://github.com/grwl/sslcaudit
ssldump0.9b3an SSLv3/TLS network protocol analyzerhttp://www.rtfm.com/ssldump/
sslnuke0.r5.c5faeaaTransparent proxy that decrypts SSL traffic and prints out IRC messages.https://github.com/jtripper/sslnuke
sslscan1.8.2A fast tools to scan SSL services, such as HTTPS.http://sourceforge.net/projects/sslscan/
sslsniff0.8A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the flyhttp://www.thoughtcrime.org/software/sslsniff/
sslstrip0.9Transparently hijack http traffic on a network, watch for https links and redirects, then map those linkshttp://www.thoughtcrime.org/software/sslstrip
sslyze0.6Python tool for analyzing the configuration of SSL servers and for identifying misconfigurationshttps://github.com/iSECPartners/sslyze
statsprocessor0.082A high-performance word-generator based on per-position Markov-attackhttp://hashcat.net/wiki/doku.php?id
stompy0.0.4an advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.http://lcamtuf.coredump.cx/
subdomainer1.2A tool designed for obtaining subdomain names from public sources.http://www.edge-security.com/subdomainer.php
subterfuge1Automated Man-in-the-Middle Attack Frameworkhttp://kinozoa.com
sucrack1.2.3A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via suhttp://labs.portcullis.co.uk/application/sucrack
sulley1.0.b139d7cA pure-python fully automated and unattended fuzzing frameworkhttps://github.com/OpenRCE/sulley/
superscan4Powerful TCP port scanner, pinger, resolver.http://www.foundstone.com/us/resources/proddesc/superscan.htm
swfintruder0.9.1First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.http://code.google.com/p/swfintruder/
synscan5.02fast asynchronous half-open TCP portscannerhttp://www.digit-labs.org/files/tools/synscan/
sysinternals-suite20131208Sysinternals tools suitehttp://sysinternals.com
t505.4.1Experimental Multi-protocol Packet Injector Toolhttp://t50.sourceforge.net/
taof0.3.2Taof is a GUI cross-platform Python generic network protocol fuzzer.http://taof.sf.net
tbear1.5Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner a bit similar to kismet, a Bluetooth DoS tool, and a Bluetooth hidden device locator.http://freshmeat.net/projects/t-bear
tcpcontrol-fuzzer201312162^6 TCP control bit fuzzer no ECN or CWR.https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer
tcpextract1.1Extracts files from captured TCP sessions. Support live streams and pcap files.https://pypi.python.org/pypi/tcpextract/1.1
tcpick0.2.1TCP stream sniffer and connection trackerhttp://tcpick.sourceforge.net/
tcpjunk2.9.03A general tcp protocols testing and hacking utilityhttp://code.google.com/p/tcpjunk
tcptraceroute1.5beta7A traceroute implementation using TCP packets.http://michael.toren.net/code/tcptraceroute/
tcpxtract1.0.1tcpxtract is a tool for extracting files from network traffichttp://tcpxtract.sourceforge.net
teardownlatestCommand line tool to send a BYE request to tear down a call.http://www.hackingexposedvoip.com/
termineter0.1.0Smart meter testing frameworkhttps://code.google.com/p/termineter/
tftp-bruteforce0.1TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.http://www.hackingexposedcisco.com/
tftp-fuzz20131208Master TFTP fuzzing script as part of the ftools series of fuzzershttp://nullsecurity.net/tools/fuzzer.html
thc-ipv62.3A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.http://thc.org/thc-ipv6/
thc-pptp-bruter0.1.4pptp-bruter is a brute force program that works against pptp vpn endpoints tcp port 1723.http://www.thc.org
thc-ssl-dos1.4A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!http://www.thc.org/thc-ssl-dos/
theharvester2.2aPython tool for gathering e-mail accounts and subdomain names from different public sources search engines, pgp key servershttp://www.edge-security.com/theHarvester.php
tiger3.2.3A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.http://www.nongnu.org/tiger/
tlssled1.3A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS HTTPS web server implementation.http://blog.taddong.com/2011/05/tlssled-v10.html
tnscmd1.3a lame tool to prod the oracle tnslsnr process 1521/tcphttp://www.jammed.com/~jwa/hacks/security/tnscmd/
tor-autocircuit0.2Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.http://www.thesprawl.org/projects/tor-autocircuit/
tpcatlatestTPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures taken on each side of the firewall as an example and report any packets that were seen on the source capture but didn’t make it to the dest.http://sourceforge.net/projects/tpcat/
trixd00r0.0.1An advanced and invisible userland backdoor based on TCP/IP for UNIX systemshttp://nullsecurity.net/tools/backdoor.html
truecrack35Password cracking for truecryptc volumes.http://code.google.com/p/truecrack/
tsh0.6An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.http://packetstormsecurity.com/search/?q
tuxcut5Netcut-like program for Linux written in PyQthttp://bitbucket.org/a_atalla/tuxcut/
twofi1Twitter Words of Interesthttp://www.digininja.org/projects/twofi.php

LEAVE A REPLY

Please enter your comment!
Please enter your name here