Multi-cloud security auditing tool
Example PAM module demonstrating two-factor authentication
Example recipes for Kubernetes Network Policies that you can just copy
Automatic SQL injection and database takeover tool
Network Load Balancer and Application Security
SKUDONET Open Source Load Balancer and Web Application Firewall
RDP monster-in-the-middle (mitm) and library for Python
Wapiti is a web-application vulnerability scanner
A malware analysis platform built in Rust
Passive & Aggressive WiFi attack distro
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Powerful framework for rogue access point attack
Password toolbox that supports national secret
Infection Monkey is a automated security testing tool for networks
Mine parameterized URLs from web archives for security testing
Six Degrees of Domain Admin
Six Degrees of Domain Admin
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP
SQL Injection Detector Modules Program for preventing SQL Injection
Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP
Automating Host Exploitation with AI
Tool to check for dependency confusion vulnerabilities
Attack Surface Management Platform | Sn1perSecurity LLC