RDP monster-in-the-middle (mitm) and library for Python
A collection of Python classes for working with network protocols
A tool that allows you to create vulnerable environments
The AWS exploitation framework, designed for testing security
A free and open source interactive HTTPS proxy
Server for security audits supporting public key authentication
Set of tools to audit SIP based VoIP Systems
CTFs as you need them
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Utilize all available CPU cores for accepting new client connections
Automatic SQL injection and database takeover tool
Lightweight service virtualization/ API simulation / API mocking tool
Powerful framework for rogue access point attack
A anti-phishing Python script with headers and proxies!
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
Scriptable network authentication cracker (formerly `badtouch`)
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Open source OWASP penetration testing tool written in Python 3
Automated exploitation tool for SSH and RDP
C2 shellcode generator/compiler/handler