Portable Penetration Testing Operating System
Shellcode implementation of Reflective DLL Injection
Identify emails, IP addresses, and more
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
Pioneering Private and Public Cloud Management since 2008
This software display the last prices of the top 20 cryptocurencies
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
A multi-tool for network pen-testing written in python.
Open Source SIEM
two factor authentication management system
Two-factor authentication system
Python3 GPG aka GnuPG Interface
Sending encrypted data through internet web applications.
PIN Knock Auth for Web Projects
Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.
A protocol agnostic application layer denial of service attack.
Information Gathering and Network Exploitation Framework
Still Developing
SecQua tries to quantify the security of a given Information System
Netviz is a Python app designed to monitor devices on the user's LAN.