C2 framework used to aid red teamers with post-exploitation
A tool that allows you to create vulnerable environments
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Tool to simulate attacks and collect the data
Linux/Windows post-exploitation framework made by linux user
A collection of Python classes for working with network protocols
Server for security audits supporting public key authentication
Set of tools to audit SIP based VoIP Systems
Powerful and flexible HTTP reverse proxy
CTFs as you need them
HTTP proxy server,support HTTPS & websocket
Utilize all available CPU cores for accepting new client connections
mitmproxy implemented with golang
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Merlin is a cross-platform post-exploitation HTTP/2 Command
The AWS exploitation framework, designed for testing security
A multi-threaded PDF password cracking utility
RDP monster-in-the-middle (mitm) and library for Python
Open source disk encryption with strong security for the Paranoid
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Intelligently block brute-force attacks by aggregating system logs
VanitySearch is a Bitcoin address prefix lookup tool.
A bleeding-edge, security-centric Arch-based Linux distribution.