C2 framework used to aid red teamers with post-exploitation
Cloudflare's PKI and TLS toolkit
Probably the most modern and sophisticated insecure web application
57 Hash Functions In One Program, plus each with HMAC or KMAC
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
110+ developer tools as native MacOS, Linux & Windows desktop apps.
Strong Email & Apache Log Analysis with Active Security Features
Shell Script to Harden Default Values in Linux Distributions
Cherrybomb is a CLI tool that helps you avoid undefined user behaviour
The PE file analysis toolkit
An Open Source Project | Since 2013 | SANS SIFT Automation | Hash Sets
AIAST –An advanced interactive application security tool
C++ cryptographic library (modern hash functions, ciphers, KDFs)
Web path scanner
Tools to bootstrap CAs, certificate requests, and signed certificates
Tools to build a full-featured administrative interface
Your Personal Hacking Terminal.
An express-based Node.js web application bootstrapping module
Vulnerable Pentesting Lab Environment
Open source platform for covert data exfiltration operations.
Sudomy is a subdomain enumeration tool to collect subdomains