CTFs as you need them
RDP monster-in-the-middle (mitm) and library for Python
A collection of Python classes for working with network protocols
A free and open source interactive HTTPS proxy
Set of tools to audit SIP based VoIP Systems
A tool that allows you to create vulnerable environments
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Utilize all available CPU cores for accepting new client connections
Server for security audits supporting public key authentication
Powerful framework for rogue access point attack
Automatic SQL injection and database takeover tool
This tools implements a RansomWare (cryptolocker, exfiltration, ...).
a bruteforcer that can crack variety of files such as zip,rar & more
A tool to check web apps for vulnerabilty
A anti-phishing Python script with headers and proxies!
Pdf password cracker using password list
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
Tiny and obfuscated ASP.NET webshell for C# web applications
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Automated exploitation tool for SSH and RDP