XRay for recon, mapping and OSINT gathering from public networks
A collection of software installations scripts for Windows systems
C2 framework used to aid red teamers with post-exploitation
Modular, high-performance, zero-dependency cryptography stack
SQL operating system instrumentation and monitoring framework
Security auditing tool for Linux, macOS, and UNIX-based system
A collection of scripts for assessing Microsoft Azure security
The AWS exploitation framework, designed for testing security
Open-source PureBasic implementation of the Shamir Secret Sharing
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP
A collection of custom security tools for quick needs.
Based on koa and typeorm,asynchronous non blocking reactive coding
Web application fuzzer
Awesome cloud enumerator
Automation for internal Windows Penetrationtest / AD-Security
A post exploitation framework designed to operate covertly
Modular Polynom manipulation in Java
PowerShell Pass The Hash Utils
Cuckoo Sandbox is for automated analysis of malware
Framework that allows the user to take advantage of implementations
Webcam and IPcam motion detection
An on-path blackbox network traffic security testing tool
Framework for Man-In-The-Middle attacks