Automatic SQL injection and database takeover tool
A free and open source interactive HTTPS proxy
CTFs as you need them
The AWS exploitation framework, designed for testing security
Powerful framework for rogue access point attack
RDP monster-in-the-middle (mitm) and library for Python
Set of tools to audit SIP based VoIP Systems
Utilize all available CPU cores for accepting new client connections
A tool that allows you to create vulnerable environments
A collection of Python classes for working with network protocols
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Server for security audits supporting public key authentication
Automating Host Exploitation with AI
Web path scanner
Portable Penetration Testing Operating System
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
a bruteforcer that can crack variety of files such as zip,rar & more
Command & Control-Framework created for collaboration in python3
Multi-core image resizer and rotator. Go crunch 'em!
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Web application fuzzer