A tool that allows you to create vulnerable environments
A collection of Python classes for working with network protocols
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
A free and open source interactive HTTPS proxy
Server for security audits supporting public key authentication
Utilize all available CPU cores for accepting new client connections
RDP monster-in-the-middle (mitm) and library for Python
Lightweight service virtualization/ API simulation / API mocking tool
Automatic SQL injection and database takeover tool
Powerful framework for rogue access point attack
A tool to check web apps for vulnerabilty
Network Enumeration Tool for Host Exploration and Recon
Automating Host Exploitation with AI
IEC 104 Multiple Masters to Single Slave
Sudomy is a subdomain enumeration tool to collect subdomains
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
A web proxy in Golang with amazing features
powerful and useful hacker dictionary builder for a brute-force attack
A small, simple PHP MVC framework skeleton that encapsulates a lot of
TCP-IP man-in-the-middle proxy
Framework for Man-In-The-Middle attacks
MitM pentesting opensource toolkit
Perform automated MITM (Man In The Middle) attacks.
Virtual Machine Image To Test Penetration Skills