CTFs as you need them
The AWS exploitation framework, designed for testing security
Tool to simulate attacks and collect the data
A tool that allows you to create vulnerable environments
Chaos testing, network emulation, stress testing tool for containers
Lightweight service virtualization/ API simulation / API mocking tool
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Linux/Windows post-exploitation framework made by linux user
HTTP proxy server,support HTTPS & websocket
Utilize all available CPU cores for accepting new client connections
Server for security audits supporting public key authentication
An advanced, yet simple, tunneling/pivoting tool
mitmproxy implemented with golang
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Easy to use cryptographic framework for data protection
Set of tools to audit SIP based VoIP Systems
Count and limit requests by key with atomic increments
Merlin is a cross-platform post-exploitation HTTP/2 Command
Application that automatically prepares Android APK files for HTTPS
C2 framework used to aid red teamers with post-exploitation
Open source disk encryption with strong security for the Paranoid
Intelligently block brute-force attacks by aggregating system logs
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
A bleeding-edge, security-centric Arch-based Linux distribution.