Klotsky class block slider puzzles.
Powerful framework for rogue access point attack
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP
Multi-core image resizer and rotator. Go crunch 'em!
It's easy to use android botnet work without port forwarding
An automated phishing tool with 30+ templates
Post-exploitation tool to cover your tracks on a compromised machine
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations
Automating Host Exploitation with AI
A C2 post-exploitation framework
Node.js express.js MongoDB JWT REST API - Basic Project Skeleton
An HTTP toolkit for security research
Scriptable network authentication cracker (formerly `badtouch`)
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
DOSA OS : Network Security Assessment & Penetration Testing VM
Pure Go HS256/384/512 JWT Token Brute-force Cracker
Gospider - Fast web spider written in Go
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Lightweight, high-performance, powerful intranet penetration proxy
Leak git repositories from misconfigured websites