Shows how easy it would be to gain unauthorized access to a system
Automatic SQL injection and database takeover tool
Brook is a cross-platform strong encryption and not detectable proxy
A versatile and portable proxy for capturing HTTP/HTTPS traffic
CTFs as you need them
It's easy to use android botnet work without port forwarding
RDP monster-in-the-middle (mitm) and library for Python
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
A collection of Python classes for working with network protocols
An advanced, yet simple, tunneling/pivoting tool
Utilize all available CPU cores for accepting new client connections
Set of tools to audit SIP based VoIP Systems
Server for security audits supporting public key authentication
mitmproxy implemented with golang
Automating Host Exploitation with AI
Merlin is a cross-platform post-exploitation HTTP/2 Command
HTTP proxy server,support HTTPS & websocket
C2 framework used to aid red teamers with post-exploitation
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Post-exploitation tool to cover your tracks on a compromised machine
Easy to use cryptographic framework for data protection
Tiny and obfuscated ASP.NET webshell for C# web applications
jSQL Injection is a Java application for automatic SQL database injec
MaddCrypt is a simple Protector for your .NET application
A tool to check web apps for vulnerabilty