Automatic SQL injection and database takeover tool
A free and open source interactive HTTPS proxy
A tool that allows you to create vulnerable environments
A collection of Python classes for working with network protocols
CTFs as you need them
RDP monster-in-the-middle (mitm) and library for Python
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Utilize all available CPU cores for accepting new client connections
Server for security audits supporting public key authentication
Set of tools to audit SIP based VoIP Systems
The AWS exploitation framework, designed for testing security
Powerful framework for rogue access point attack
A anti-phishing Python script with headers and proxies!
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
A Python Package for Data Exfiltration
Security tools that can be used to audit SIP based VoIP systems
C2/post-exploitation framework
Automated exploitation tool for SSH and RDP
Web application fuzzer
Full-featured C2 framework which silently persists on webserver
A powerful MongoDB auditing and pentesting tool
Toolkit aimed to perform lateral movement in restricted environments