- Category: Submissions
The collection of tools on HackArmoury.com are provided entirely by trusted penetration testers and ethical security professionals. We welcome new submissions and notification of new releases, and will always credit original authors (if you so wish).
What tools are we looking for? Simple answer, anything related to security testing, whether it be a small perl script or full security framework. We prefer GPL licensed software with source code, though as long as your license agreement allows us to host the software and the tool is even remotely useful, we'll host it. We do not host destructive tools or code.
If you're not the original author of a tool, but you use it in your day-to-day security testing, please send us a link to the author's site and we'll try to include it.
All uploaded tools are verified for suitability and integrity by our approval team prior to being released to the public. Integrity checks normally involve cross referencing checksums with the original author (if available), virus scans and possible execution in a suitably isolated sandbox environment.