WindowTextExtractor allows you to get a text from any OS
A collection of Python classes for working with network protocols
Utilize all available CPU cores for accepting new client connections
An advanced, yet simple, tunneling/pivoting tool
Easy to use cryptographic framework for data protection
Set of tools to audit SIP based VoIP Systems
Security auditing tool for Linux, macOS, and UNIX-based system
Linux/Windows post-exploitation framework made by linux user
RDP monster-in-the-middle (mitm) and library for Python
Server for security audits supporting public key authentication
A tool that allows you to create vulnerable environments
Chaos testing, network emulation, stress testing tool for containers
Merlin is a cross-platform post-exploitation HTTP/2 Command
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
mitmproxy implemented with golang
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Count and limit requests by key with atomic increments
C2 framework used to aid red teamers with post-exploitation
A multi-threaded PDF password cracking utility
The AWS exploitation framework, designed for testing security
Open source disk encryption with strong security for the Paranoid
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Intelligently block brute-force attacks by aggregating system logs
Powerful framework for rogue access point attack