An HTTP toolkit for security research
Scriptable network authentication cracker (formerly `badtouch`)
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
DOSA OS : Network Security Assessment & Penetration Testing VM
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Gospider - Fast web spider written in Go
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
Vulnerable Pentesting Lab Environment
C2/post-exploitation framework
Lightweight, high-performance, powerful intranet penetration proxy
Open source OWASP penetration testing tool written in Python 3
Leak git repositories from misconfigured websites
Automated exploitation tool for SSH and RDP
Extension that allows you to intercept and edit HTTP/HTTPS requests
Sudomy is a subdomain enumeration tool to collect subdomains
zynix-Fusion is a framework for hacking
C2 shellcode generator/compiler/handler
Linux for Penetration testing and Programming
Awesome cloud enumerator
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
Advanced Ethical Hacking and Penetration Testing Platform
A powerful MongoDB auditing and pentesting tool