The collection of tools on are provided entirely by trusted penetration testers and ethical security professionals. We welcome new submissions and notification of new releases, and will always credit original authors (if you so wish).

What tools are we looking for? Simple answer, anything related to security testing, whether it be a small perl script or full security framework. We prefer GPL licensed software with source code, though as long as your license agreement allows us to host the software and the tool is even remotely useful, we'll host it. We do not host destructive tools or code.

If you're not the original author of a tool, but you use it in your day-to-day security testing, please send us a link to the author's site and we'll try to include it.

All submissions requests should be sent to This e-mail address is being protected from spambots. You need JavaScript enabled to view it. , stating the name and a brief description of the tool and a URL if available. If accepted, we will either obtain and host the tool on your behalf, or issue you further instructions on how to proceed. Regular contributors can apply for an account for upload access via SVN.

All uploaded tools are verified for suitability and integrity by our approval team prior to being released to the public. Integrity checks normally involve cross referencing checksums with the original author (if available), virus scans and possible execution in a suitably isolated sandbox environment.