Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
4f2787c43216dff36fb4259679e7c0472b9a925a20cd0a2caf91eeae0dfc3208
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
0500102433849bbe3231c590973d126c2d2d6b3943b4b9f9962bdb108436e6c4
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.
7989c93daccd5cd2b8c782950c9c05b07d0f6711274cedfcbf7be38e941d0a93
Intel Processor Identification Utility version 6.0.0211 suffers from a local privilege escalation vulnerability.
18b5a81e1da4cff60545121275526325503d467e4282f7ffac69136bae2a23cd
FlexNet Publisher version 11.12.1 suffers from a cross site request forgery vulnerability.
3bc1c76fee354ec8cf2d7dbe9cd0af6558bfd6d10490f30d8649322f4bd04aa0
Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.
64a93093c3144c62847025d1a0a0a0a219c1538c1ff7ebd71cf3f9e630e664b0