Server for security audits supporting public key authentication
Automatic SQL injection and database takeover tool
Web Debugging Proxy for macOS, iOS, and Android
An advanced, yet simple, tunneling/pivoting tool
Utilize all available CPU cores for accepting new client connections
A versatile and portable proxy for capturing HTTP/HTTPS traffic
Merlin is a cross-platform post-exploitation HTTP/2 Command
HTTP proxy server,support HTTPS & websocket
Set of tools to audit SIP based VoIP Systems
Brook is a cross-platform strong encryption and not detectable proxy
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
CTFs as you need them
Easy to use cryptographic framework for data protection
A collection of Python classes for working with network protocols
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
C2 framework used to aid red teamers with post-exploitation
CSZ CMS is a open source content management system. With Codeigniter.
It's easy to use android botnet work without port forwarding
An automated phishing tool with 30+ templates
Post-exploitation tool to cover your tracks on a compromised machine
Automating Host Exploitation with AI
Kraken: A multi-platform distributed brute-force password cracking
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Lightweight, high-performance, powerful intranet penetration proxy