Shows how easy it would be to gain unauthorized access to a system
Cross-platform multi-protocol VPN software
Remote isolated browser API for security
RDP monster-in-the-middle (mitm) and library for Python
An advanced, yet simple, tunneling/pivoting tool
A collection of Python classes for working with network protocols
Automating Host Exploitation with AI
GRR Rapid Response, remote live forensics for incident response
Server for security audits supporting public key authentication
mitmproxy implemented with golang
Anti-Spam SMTP Proxy Server implements multiple spam filters
For full, incremental, compressed and encrypted backups or archives
AS2 1.1 server implementation in Java
Chat Messenger. E-Mail-Client. Websearch. Filetransfer.
Remote browser isolation for all
C2 shellcode generator/compiler/handler
Free Introduction to Bash Scripting eBook
Open source OWASP penetration testing tool written in Python 3
Full-featured C2 framework which silently persists on webserver
File based encrypted key-value store
Latency and Fault Tolerance for Distributed Systems
A web proxy in Golang with amazing features