Security tools that can be used to audit SIP based VoIP systems
Lightweight, high-performance, powerful intranet penetration proxy
Full-featured C2 framework which silently persists on webserver
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
finder scaner complet
cSploit - An Android network penetration suite.
keygen key generator keygenerator brute force
Pentest virtual machine