A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations
Automating Host Exploitation with AI
Attack Surface Management Platform | Sn1perSecurity LLC
Portable Penetration Testing Operating System
A C2 post-exploitation framework
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
Scriptable network authentication cracker (formerly `badtouch`)
An HTTP toolkit for security research
DOSA OS : Network Security Assessment & Penetration Testing VM
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Simple multithreading bruteforce hash cracker written in Go
Pure Go HS256/384/512 JWT Token Brute-force Cracker
A Python Package for Data Exfiltration
Gospider - Fast web spider written in Go
Vulnerable Pentesting Lab Environment
C2/post-exploitation framework
Open source OWASP penetration testing tool written in Python 3
Leak git repositories from misconfigured websites
Automated exploitation tool for SSH and RDP
Lightweight, high-performance, powerful intranet penetration proxy
Extension that allows you to intercept and edit HTTP/HTTPS requests
Sudomy is a subdomain enumeration tool to collect subdomains
zynix-Fusion is a framework for hacking