RDP monster-in-the-middle (mitm) and library for Python
A collection of Python classes for working with network protocols
A tool that allows you to create vulnerable environments
A free and open source interactive HTTPS proxy
The AWS exploitation framework, designed for testing security
Set of tools to audit SIP based VoIP Systems
CTFs as you need them
Server for security audits supporting public key authentication
Automatic SQL injection and database takeover tool
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Utilize all available CPU cores for accepting new client connections
Lightweight service virtualization/ API simulation / API mocking tool
Powerful framework for rogue access point attack
A anti-phishing Python script with headers and proxies!
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
Scriptable network authentication cracker (formerly `badtouch`)
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Open source OWASP penetration testing tool written in Python 3
Automated exploitation tool for SSH and RDP
C2 shellcode generator/compiler/handler