Automatic SQL injection and database takeover tool
Server for security audits supporting public key authentication
A versatile and portable proxy for capturing HTTP/HTTPS traffic
Utilize all available CPU cores for accepting new client connections
Brook is a cross-platform strong encryption and not detectable proxy
Set of tools to audit SIP based VoIP Systems
Merlin is a cross-platform post-exploitation HTTP/2 Command
An advanced, yet simple, tunneling/pivoting tool
CTFs as you need them
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
HTTP proxy server,support HTTPS & websocket
C2 framework used to aid red teamers with post-exploitation
A collection of Python classes for working with network protocols
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Easy to use cryptographic framework for data protection
CSZ CMS is a open source content management system. With Codeigniter.
It's easy to use android botnet work without port forwarding
jSQL Injection is a Java application for automatic SQL database injec
An automated phishing tool with 30+ templates
Post-exploitation tool to cover your tracks on a compromised machine
Automating Host Exploitation with AI
Kraken: A multi-platform distributed brute-force password cracking
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Lightweight, high-performance, powerful intranet penetration proxy
Extension that allows you to intercept and edit HTTP/HTTPS requests