Shows how easy it would be to gain unauthorized access to a system
The OWASP ZAP core project
Automated hacking tool to find leaked databases with 97.1% accuracy
Security auditing tool for Linux, macOS, and UNIX-based system
An advanced, yet simple, tunneling/pivoting tool
Chaos testing, network emulation, stress testing tool for containers
Tool to simulate attacks and collect the data
Lightweight service virtualization/ API simulation / API mocking tool
Flipper Zero firmware source code
A free and open source interactive HTTPS proxy
mitmproxy implemented with golang
Automatic SQL injection and database takeover tool
Set of tools to audit SIP based VoIP Systems
A tool that allows you to create vulnerable environments
A fully open source & end-to-end encrypted note taking alternative
The browser exploitation framework project
Powerful and flexible HTTP reverse proxy
Decode various cryptocurrency addresses
A anti-phishing Python script with headers and proxies!
RDP monster-in-the-middle (mitm) and library for Python
An automated phishing tool with 30+ templates
Post-exploitation tool to cover your tracks on a compromised machine
A swiss army knife for pentesting networks
A C2 post-exploitation framework
Kraken: A multi-platform distributed brute-force password cracking