Server for security audits supporting public key authentication
Automated hacking tool to find leaked databases with 97.1% accuracy
Shows how easy it would be to gain unauthorized access to a system
Linux/Windows post-exploitation framework made by linux user
Intelligently block brute-force attacks by aggregating system logs
Automated exploitation tool for SSH and RDP
SSH man-in-the-middle tool
Network Pivoting Toolkit
The best SSH penetration testing tool ever!
Perform anonymous and non-anonymous pentesting.