Chaos testing, network emulation, stress testing tool for containers
RDP monster-in-the-middle (mitm) and library for Python
HTTP proxy server,support HTTPS & websocket
Lightweight service virtualization/ API simulation / API mocking tool
An advanced, yet simple, tunneling/pivoting tool
Count and limit requests by key with atomic increments
Scanner detecting the use of JavaScript libraries
Linux/Windows post-exploitation framework made by linux user
Post-exploitation tool to cover your tracks on a compromised machine
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP
Merlin is a cross-platform post-exploitation HTTP/2 Command
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
A versatile and portable proxy for capturing HTTP/HTTPS traffic
Automating Host Exploitation with AI
It's easy to use android botnet work without port forwarding
Easy to use cryptographic framework for data protection
mitmproxy implemented with golang
CTFs as you need them
C2 framework used to aid red teamers with post-exploitation
Automated hacking tool to find leaked databases with 97.1% accuracy
A C2 post-exploitation framework
Open source disk encryption with strong security for the Paranoid
Portable Penetration Testing Operating System
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton