Distro Penetrasing Live System Burn to USB Flash Disk & Run.
mitmproxy implemented with golang
Linux/Windows post-exploitation framework made by linux user
C2 framework used to aid red teamers with post-exploitation
Merlin is a cross-platform post-exploitation HTTP/2 Command
A tool that allows you to create vulnerable environments
Chaos testing, network emulation, stress testing tool for containers
Lightweight service virtualization/ API simulation / API mocking tool
Set of tools to audit SIP based VoIP Systems
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
HTTP proxy server,support HTTPS & websocket
Server for security audits supporting public key authentication
Easy to use cryptographic framework for data protection
Count and limit requests by key with atomic increments
Powerful and flexible HTTP reverse proxy
CTFs as you need them
RDP monster-in-the-middle (mitm) and library for Python
The AWS exploitation framework, designed for testing security
The Ray Tracing in One Weekend series of books
A multi-threaded PDF password cracking utility
Open source disk encryption with strong security for the Paranoid
Intelligently block brute-force attacks by aggregating system logs
JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux
A bleeding-edge, security-centric Arch-based Linux distribution.