Take it like a gift

ike-scan
ike-scan

Discover and fingerprint IKE hosts.

ScriptSentry
ScriptSentry

ScriptSentry finds misconfigured and dangerous logon scripts.

CarbonCopy
CarbonCopy

Creates a spoofed certificate of any online website and signs an executable for AV evasion.

Corsy
Corsy

CORS Misconfiguration Scanner.

CloudFail
CloudFail

Utilize misconfigured DNS and old database records to find hidden IPs behind CloudFlare network.

CyberChef
CyberChef

A web app for encryption, encoding, compression and data analysis.

Bug Bounty Reference
Bug Bounty Reference

A list of Bug Bounty writeups that is categorized by the bug nature.

Demiguise
Demiguise

HTA encryption tool for Red Teams.

API fuzzer
API fuzzer

Fuzz request attributes using common pentesting techniques and lists vulnerabilities.

certSniff
certSniff

A certificate transparency log keyword sniffer written in Python.

Acunetix
Acunetix

Quickly find and fix the vulnerabilities that put your web applications at risk of attack.

0d1n
0d1n

Tool for automating customized attacks against web applications.

bounty-targets-data
bounty-targets-data

Hourly-updated data dumps of bug bounty platform scopes that are eligible for reports.

Coercer
Coercer

Automatically coerce a Windows server to authenticate on an arbitrary machine.

cadaver
cadaver

Command-line WebDAV client.