Security tools that can be used to audit SIP based VoIP systems
Lightweight, high-performance, powerful intranet penetration proxy
Full-featured C2 framework which silently persists on webserver
Advanced Ethical Hacking and Penetration Testing Platform
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Prediction of proteinfolding in 2D HP model
finder scaner complet
cSploit - An Android network penetration suite.
keygen key generator keygenerator brute force
Pentest virtual machine