A HTTP proxy that logs everything flowing through it
Security tools that can be used to audit SIP based VoIP systems
Vulnerable Pentesting Lab Environment
C2/post-exploitation framework
Lightweight, high-performance, powerful intranet penetration proxy
Leak git repositories from misconfigured websites
Open source OWASP penetration testing tool written in Python 3
Automated exploitation tool for SSH and RDP
zynix-Fusion is a framework for hacking
Linux for Penetration testing and Programming
Extension that allows you to intercept and edit HTTP/HTTPS requests
Sudomy is a subdomain enumeration tool to collect subdomains
C2 shellcode generator/compiler/handler
Awesome cloud enumerator
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
Advanced Ethical Hacking and Penetration Testing Platform
OpenSSL tool for security, pentests and forensics investigation
A powerful MongoDB auditing and pentesting tool
Advanced Network Packet Generator
Toolkit aimed to perform lateral movement in restricted environments
Virtual training environment to learn web app ethical hacking.
C# Sudoku solver that uses human techniques; no brute-forcing.
WebSploit is a high level MITM Framework
Blackhat-Global-Lite OS Debian Buster based custom distro