![download oxygen forensic suite 2013 standard download oxygen forensic suite 2013 standard](https://img.informer.com/screenshots/6711/6711354_3.png)
![download oxygen forensic suite 2013 standard download oxygen forensic suite 2013 standard](https://linuxhint.com/wp-content/uploads/2020/07/14-4.png)
This list is clearly meant to help white hats, and for now I prefer to err on the safe side. Tools listed on the page are categorized as network, debugging and reverse engineering, fuzzing, web, forensics, malware analysis, PDF, miscellaneous, and other useful libraries and tools.Īccording to the author of the page: “Some of the more aggressive tools (pentest frameworks, Bluetooth smashers, web application vulnerability scanners, war-dialers, etc.) are left out, because the legal situation of these tools is still a bit unclear in Germany-even after the decision of the highest court. If you are a Python programmer and enthusiast, then I believe that you should check out Dirk Loss’s list of Python tools for penetration testers. I suggest you take a look at these three projects Agent Steal, Pentesters Toolkit, and wdivulge.ĭirk Loss: Python Tools for Penetration Testers is known for maintaining the world’s largest public hacker database on the net (SOLDIERX HDB) but they also maintains their own public projects, which can be found on the SX Labs page, and their recommended tools collection, which can be found at.
Download oxygen forensic suite 2013 standard password#
is also the home of the projects made by NJ OUCHN and Maxi Soler including vFeed® (an open source correlated and cross-linked vulnerability XML database), DPE (the Default Password Enumeration Project), FireCAT (Firefox Catalog of Auditing exTension), AS/400 Security Assessment Mindmap, KromCAT (Google Chrome Catalog of Auditing exTensions), and SSA (Security System Analyzer 2.0). You can also submit your very own tool for promotion. is maintained by NJ OUCHN and Maxi Soler It’s a cool website where you can find up-to-date releases of tools that are used by auditors, penetration testers, web application security consultants, system administrators, network administrators, malware analysts, infosec enthusiasts, and security experts.