A swiss army knife for pentesting networks
Post-exploitation tool to cover your tracks on a compromised machine
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
Attack Surface Management Platform | Sn1perSecurity LLC
Portable Penetration Testing Operating System
A C2 post-exploitation framework
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
An HTTP toolkit for security research
Scriptable network authentication cracker (formerly `badtouch`)
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
DOSA OS : Network Security Assessment & Penetration Testing VM
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Vulnerable Pentesting Lab Environment
Gospider - Fast web spider written in Go
A Python Package for Data Exfiltration
C2/post-exploitation framework
Lightweight, high-performance, powerful intranet penetration proxy
Open source OWASP penetration testing tool written in Python 3
Leak git repositories from misconfigured websites
Automated exploitation tool for SSH and RDP
Sudomy is a subdomain enumeration tool to collect subdomains
C2 shellcode generator/compiler/handler
Extension that allows you to intercept and edit HTTP/HTTPS requests