Framework for Man-In-The-Middle attacks
two factor authentication management system
Python-based reverse-engineering tool
A push-button wireless hacking and Man-in-the-Middle attack toolkit
Set limits on per-day total usage for Linux/Unix users
Information Gathering and Network Exploitation Framework
Post-Exploitation Framework