Automating Host Exploitation with AI
Pdf password cracker using password list
Web path scanner
Command & Control-Framework created for collaboration in python3
Tiny and obfuscated ASP.NET webshell for C# web applications
Portable Penetration Testing Operating System
Scriptable network authentication cracker (formerly `badtouch`)
Hacking Chrome Saved Passwords
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
IEC 104 Multiple Masters to Single Slave
C2 shellcode generator/compiler/handler
Web application fuzzer
PYramid is a usefull tool for programers.
Open source OWASP penetration testing tool written in Python 3
Automated exploitation tool for SSH and RDP
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
A powerful MongoDB auditing and pentesting tool
Advanced Ethical Hacking and Penetration Testing Platform
Toolkit aimed to perform lateral movement in restricted environments
Virtual training environment to learn web app ethical hacking.
Network Pivoting Toolkit