Virtual training environment to learn web app ethical hacking.
Automated hacking tool to find leaked databases with 97.1% accuracy
An advanced, yet simple, tunneling/pivoting tool
Security tools that can be used to audit SIP based VoIP systems
Linux/Windows post-exploitation framework made by linux user
A Stealthy Trojan Spyware
Zip Unlocker WinZip/WinRAR Password Unlocker
Intelligently block brute-force attacks by aggregating system logs
mitmproxy implemented with golang
keygen key generator keygenerator brute force
Hook into application processes and monitor network interactions
Advanced Ethical Hacking and Penetration Testing Platform
Merlin is a cross-platform post-exploitation HTTP/2 Command
OMEN: Ordered Markov ENumerator - Password Guesser
Exploitation Framework for Embedded Devices
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Chaos testing, network emulation, stress testing tool for containers
WindowTextExtractor allows you to get a text from any OS
BHS debian (testing) jessie/sid
A bleeding-edge, security-centric Arch-based Linux distribution.