XRay for recon, mapping and OSINT gathering from public networks
C2 framework used to aid red teamers with post-exploitation
SQL operating system instrumentation and monitoring framework
Modular, high-performance, zero-dependency cryptography stack
Security auditing tool for Linux, macOS, and UNIX-based system
The AWS exploitation framework, designed for testing security
Open-source PureBasic implementation of the Shamir Secret Sharing
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP
A collection of custom security tools for quick needs.
Based on koa and typeorm,asynchronous non blocking reactive coding
Web application fuzzer
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Cuckoo Sandbox is for automated analysis of malware
Framework that allows the user to take advantage of implementations
Webcam and IPcam motion detection
An on-path blackbox network traffic security testing tool
Framework for Man-In-The-Middle attacks
Tweakable 256-bit symmetrical block cipher.
Free and Open Source Web Sites Builder
Web Application Security Scanner Framework
two factor authentication management system
Access Management and Single Signon platform