Take it like a gift

FDsploit
FDsploit

File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.

Amnesiac
Amnesiac

Post-exploitation framework designed to assist with lateral movement within Active Directory.

Dirstalk
Dirstalk

Multi threaded application designed to brute force paths on web servers.

ConfuserEx
ConfuserEx

An open-source, free protector for .NET applications.

aircrack-ng
aircrack-ng

Complete suite of tools to assess WiFi network security.

Amass
Amass

In-depth Attack Surface Mapping and Asset Discovery.

bbscope
bbscope

Scope gathering tool for multiple Bug Bounty platforms.

big-list-of-naughty-strings
big-list-of-naughty-strings

A list of strings which have a high probability of causing issues when used as user-input data.

Agartha
Agartha

Burp Suite extension for dynamic payload generation to detect injection flaws.

Bypass URL Parser
Bypass URL Parser

Tool that tests MANY url bypasses to reach a 40X protected page.

BlueHound
BlueHound

Pinpoint the security issues that actually matter.

bettercap
bettercap

The Swiss Army knife for WiFi, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

ADRecon
ADRecon

Gather information about the Active Directory and generates a report.

trurl
trurl

Command line tool for URL parsing and manipulation.

Cain and Abel
Cain and Abel

Password recovery tool for Microsoft Operating Systems.