A tool that allows you to create vulnerable environments
A collection of Python classes for working with network protocols
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
A free and open source interactive HTTPS proxy
Server for security audits supporting public key authentication
Utilize all available CPU cores for accepting new client connections
Lightweight service virtualization/ API simulation / API mocking tool
RDP monster-in-the-middle (mitm) and library for Python
Automatic SQL injection and database takeover tool
Powerful framework for rogue access point attack
Network Enumeration Tool for Host Exploration and Recon
Automating Host Exploitation with AI
Sudomy is a subdomain enumeration tool to collect subdomains
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
A web proxy in Golang with amazing features
powerful and useful hacker dictionary builder for a brute-force attack
A small, simple PHP MVC framework skeleton that encapsulates a lot of
MitM pentesting opensource toolkit
Framework for Man-In-The-Middle attacks
Perform automated MITM (Man In The Middle) attacks.
Virtual Machine Image To Test Penetration Skills
A web interface for various penetration testing tools
self defense system