Scanner detecting the use of JavaScript libraries
Linux/Windows post-exploitation framework made by linux user
A tool that allows you to create vulnerable environments
A collection of Python classes for working with network protocols
An advanced, yet simple, tunneling/pivoting tool
mitmproxy implemented with golang
Post-exploitation tool to cover your tracks on a compromised machine
Chaos testing, network emulation, stress testing tool for containers
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP
Merlin is a cross-platform post-exploitation HTTP/2 Command
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
HTTP proxy server,support HTTPS & websocket
Lightweight service virtualization/ API simulation / API mocking tool
Server for security audits supporting public key authentication
Easy to use cryptographic framework for data protection
Count and limit requests by key with atomic increments
C2 framework used to aid red teamers with post-exploitation
Automating Host Exploitation with AI
Web path scanner
World's fastest and most advanced password recovery utility
Portable Penetration Testing Operating System
Open source disk encryption with strong security for the Paranoid
Automated hacking tool to find leaked databases with 97.1% accuracy
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
A C2 post-exploitation framework