can-utils : SocketCAN userspace utilities and tools ( https://github.com/linux-can/can-utils )
gowitness : A web screenshot utility using Chrome Headless ( https://github.com/sensepost/gowitness )
hackertarget : A security toolkit for organizations with attack surface discovery ( https://github.com/ismailtasdelen/hackertarget )
httprobe : Take a list of domains and probe for working HTTP and HTTPS servers ( https://github.com/tomnomnom/httprobe )
linkfinder : A python script that finds endpoints in JavaScript files ( https://github.com/GerbenJavado/LinkFinder )
munin : Online hash checker for Virustotal and other services ( https://github.com/Neo23x0/munin )
pwnedornot : OSINT Tool for Finding Passwords of Compromised Email Addresses Topics ( https://github.com/thewhiteh4t/pwnedOrNot )
seafile : File syncing and sharing software with file encryption and group sharing ( https://www.seafile.com/ https://github.com/haiwen/seafile/ )
seafile-client : Seafile desktop client ( https://www.seafile.com/ https://github.com/haiwen/seafile-client/ )
sipp : A free Open Source test tool / traffic generator for the SIP protocol ( http://sipp.sourceforge.net/ https://github.com/SIPp/sipp/releases )
sippts : set of tools to audit VoIP servers and devices using SIP protocol ( https://github.com/Pepelux/sippts )
t50 : Mixed Packet Injector and Network Stress Testing Tool ( https://github.com/merces/t50 )
voipong : detect all VoIP calls on a pipeline and dump actual conversation ( http://www.enderunix.org/voipong/ )
wireshark-patoolkit : a collection of traffic analysis Wireshark plugins focused on security ( https://github.com/pentesteracademy/patoolkit )
Add an ebuild in portage :
The ebuild is now in the portage tree.
You can also use layman : emerge layman then layman -a pentoo
For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage
If you have a problem : ycarus(-at-)zugaina.org