Shows how easy it would be to gain unauthorized access to a system
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
Web Debugging Proxy for macOS, iOS, and Android
RDP monster-in-the-middle (mitm) and library for Python
The first messaging platform operating without user identifiers
Set of tools to audit SIP based VoIP Systems
A collection of Python classes for working with network protocols
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
A C2 post-exploitation framework
FTP BruteForce tool For real Pentest
IEC 104 Multiple Masters to Single Slave
powerful SSH BruteForce tool
Lightweight, high-performance, powerful intranet penetration proxy
A post exploitation framework designed to operate covertly
Network Pivoting Toolkit
a Toolset for Molecular Mechanical Force Field Parameterization
WPS wireless protocol audit software for Windows
Advanced Data Generator
Framework for Man-In-The-Middle attacks
ARP handler inspection