A tool that allows you to create vulnerable environments
Tool to simulate attacks and collect the data
Utilize all available CPU cores for accepting new client connections
mitmproxy implemented with golang
The Ray Tracing in One Weekend series of books
Merlin is a cross-platform post-exploitation HTTP/2 Command
Set of tools to audit SIP based VoIP Systems
Server for security audits supporting public key authentication
Linux/Windows post-exploitation framework made by linux user
Chaos testing, network emulation, stress testing tool for containers
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP
Post-exploitation tool to cover your tracks on a compromised machine
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Easy to use cryptographic framework for data protection
HTTP proxy server,support HTTPS & websocket
Lightweight service virtualization/ API simulation / API mocking tool
Count and limit requests by key with atomic increments
C2 framework used to aid red teamers with post-exploitation
Automating Host Exploitation with AI
Web path scanner
World's fastest and most advanced password recovery utility
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Open source disk encryption with strong security for the Paranoid
Automated hacking tool to find leaked databases with 97.1% accuracy
Portable Penetration Testing Operating System