Web application fuzzer
A free and open source interactive HTTPS proxy
A collection of Python classes for working with network protocols
Set of tools to audit SIP based VoIP Systems
Automatic SQL injection and database takeover tool
A tool that allows you to create vulnerable environments
Utilize all available CPU cores for accepting new client connections
Security tools that can be used to audit SIP based VoIP systems
CTFs as you need them
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Server for security audits supporting public key authentication
The AWS exploitation framework, designed for testing security
RDP monster-in-the-middle (mitm) and library for Python
A anti-phishing Python script with headers and proxies!
Powerful framework for rogue access point attack
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
A Python Package for Data Exfiltration
C2/post-exploitation framework
Automated exploitation tool for SSH and RDP
Full-featured C2 framework which silently persists on webserver
A powerful MongoDB auditing and pentesting tool
Toolkit aimed to perform lateral movement in restricted environments