Black Hat Tools List 2018
Android, iOS, and mobile hackers
Vulnerable iOS app: Swift version
Code evaluation - OWASP dependency check
Cougar scan
Encryption - DeepViolet: SSL / TLS scanning API and tools
Data forensics and incident response - Beginner to expert
CyBot: Open Source Threat Intelligence Chatbot
LogonTracer
Rastrea2r (reload!): Collect and hunt IOC with Gusto and Style
RedHunt OS (VM): Virtual machine for adversary emulation and threat search
Exploitation and ethical hacking - AVET: AntiVirus Evasion Tool
DSP: Docker Security Playground
hideNsneak: Attack Confusion Framework
Merlin
RouterSploit
Hardware / Embedded - ChipWhisperer
JTAGulator: Uncover the Achilles heel of hardware security
Micro-Renovator: Bring the processor firmware into the code
TumbleRF: RF Blur becomes easy
Walrus: Make the most of your card cloning device
IoT- Scalable Dynamic Analysis Framework for IoT Devices
BLE CTF project
WHID Syringe and WHID Elite: Next Generation HID Aggressive Device
Malware Defense - Provides advanced deep learning analysis platform for every security researcher
EKTotal
Firmware Audit: Platform Firmware Security Automation for Blue Teams and DFIR
MaliceIO
Goal — see MacOS Security Tools
Malware offensive: BloodHound 1.5
Cyber attack: armory
Chiron: An advanced IPv6 security assessment and penetration testing framework
DELTA: SDN Security Assessment Framework
Mallet: Intercepting agent for any protocol
PowerUpSQL: PowerShell Toolkit for attacking SQL Server in an enterprise environment
WarBerryPi
Network Defense - ANWI (New Wireless IDS): $5 WIDS
CHIRON: Home-based network analysis and machine learning threat detection framework
Cloud Security Suite: One-stop tool for AWS / GCP / Azure security auditing at
DejaVu: An open source spoofing framework
OSINT — Open Source Smart: DataSploit 2.0
Dradis framework: Learn how to reduce reporting time by half
Reverse Engineering - Snake: Malware Storage Zoo
Smart Grid/Industrial Safety - GRFICS: Graphic Realism Framework for Industrial Control Simulation
Vulnerability Assessment - Robustness Toolbox for Machine Learning Models
Android Dynamic Analysis Tool (ADA)
Archery: Open Source Vulnerability Assessment and Management
Boofuzz
BTA
Take advantage of
https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit
Halcyon IDE: for Nmap script developers
SimpleRisk
TROMMEL
Web AppSec - Take a look at NGINX’s ModSec 3.0: Software Web Application Firewall
Astra: Automatic security testing of the REST API
Burp Replicator: Replication of automated complex vulnerabilities
OWASP offensive web testing framework
OWASP JoomScan project
WSSAT
Source: GitHub