Security tools that can be used to audit SIP based VoIP systems
An advanced, yet simple, tunneling/pivoting tool
Lightweight service virtualization/ API simulation / API mocking tool
Automating Host Exploitation with AI
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Metasploitable is an intentionally vulnerable Linux virtual machine
Crack WPA Wi-Fi routers with Airodump-ng and Aircrack-ng Hashcat
Web and mobile application security awareness/training platform
Virtual Machine Image To Test Penetration Skills
Pentest virtual machine
Open Source API-centric PHP Micro-framework
A Pen Test Drop Box distro for the Raspberry Pi
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
Training and educating about the web security