Server for security audits supporting public key authentication
Automated hacking tool to find leaked databases with 97.1% accuracy
Linux/Windows post-exploitation framework made by linux user
Shows how easy it would be to gain unauthorized access to a system
Automated exploitation tool for SSH and RDP
SSH man-in-the-middle tool
Network Pivoting Toolkit
The best SSH penetration testing tool ever!