The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
This is a multi-use bash script for Linux systems
Security auditing tool for Linux, macOS, and UNIX-based system
Powerful framework for rogue access point attack
Automating Host Exploitation with AI
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Automated exploitation tool for SSH and RDP
Sudomy is a subdomain enumeration tool to collect subdomains
A tool which simplifies blocking remote secure shell attacks.
finder scaner complet
Admin finder scaner
Perl Hacking Tools (BackTrack)
Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
Security & Penetration Testing Suite