Utilize all available CPU cores for accepting new client connections
An advanced, yet simple, tunneling/pivoting tool
Set of tools to audit SIP based VoIP Systems
Linux/Windows post-exploitation framework made by linux user
A tool that allows you to create vulnerable environments
RDP monster-in-the-middle (mitm) and library for Python
Chaos testing, network emulation, stress testing tool for containers
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Easy to use cryptographic framework for data protection
Merlin is a cross-platform post-exploitation HTTP/2 Command
Security auditing tool for Linux, macOS, and UNIX-based system
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Server for security audits supporting public key authentication
mitmproxy implemented with golang
Count and limit requests by key with atomic increments
C2 framework used to aid red teamers with post-exploitation
The AWS exploitation framework, designed for testing security
Open source disk encryption with strong security for the Paranoid
Powerful framework for rogue access point attack
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Sokoban with many families of puzzles provided.
CSZ CMS is a open source content management system. With Codeigniter.
Decode various cryptocurrency addresses