Utilize all available CPU cores for accepting new client connections
Set of tools to audit SIP based VoIP Systems
Security tools that can be used to audit SIP based VoIP systems
Web application fuzzer
A tool that allows you to create vulnerable environments
Lightweight service virtualization/ API simulation / API mocking tool
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
A anti-phishing Python script with headers and proxies!
Network Enumeration Tool for Host Exploration and Recon
Multi-core image resizer and rotator. Go crunch 'em!
Pdf password cracker using password list
Automating Host Exploitation with AI
Portable Penetration Testing Operating System
IEC 104 Multiple Masters to Single Slave
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
a Toolset for Molecular Mechanical Force Field Parameterization
Network Pivoting Toolkit
powerful and useful hacker dictionary builder for a brute-force attack
MitM pentesting opensource toolkit
Virtual Machine Image To Test Penetration Skills
A web interface for various penetration testing tools
Wp-crack is simple tool for brute force Wordpress