Tool to simulate attacks and collect the data
A tool that allows you to create vulnerable environments
Powerful and flexible HTTP reverse proxy
CTFs as you need them
A multi-threaded PDF password cracking utility
Server for security audits supporting public key authentication
An advanced, yet simple, tunneling/pivoting tool
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Utilize all available CPU cores for accepting new client connections
mitmproxy implemented with golang
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Set of tools to audit SIP based VoIP Systems
Count and limit requests by key with atomic increments
C2 framework used to aid red teamers with post-exploitation
Merlin is a cross-platform post-exploitation HTTP/2 Command
The AWS exploitation framework, designed for testing security
Open source disk encryption with strong security for the Paranoid
Powerful framework for rogue access point attack
Intelligently block brute-force attacks by aggregating system logs
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
A bleeding-edge, security-centric Arch-based Linux distribution.
VanitySearch is a Bitcoin address prefix lookup tool.
JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)