Server for security audits supporting public key authentication
A versatile and portable proxy for capturing HTTP/HTTPS traffic
The AWS exploitation framework, designed for testing security
Windows memory hacking library
Windows dll injector
Hook into application processes and monitor network interactions
Framework for Man-In-The-Middle attacks
MitM pentesting opensource toolkit
cSploit - An Android network penetration suite.