Network Enumeration Tool for Host Exploration and Recon
Powerful framework for rogue access point attack
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
Command & Control-Framework created for collaboration in python3
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI
Web path scanner
Portable Penetration Testing Operating System
Scriptable network authentication cracker (formerly `badtouch`)
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
A Python Package for Data Exfiltration
C2/post-exploitation framework
Open source OWASP penetration testing tool written in Python 3
Automated exploitation tool for SSH and RDP
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
Advanced Ethical Hacking and Penetration Testing Platform
A powerful MongoDB auditing and pentesting tool
Toolkit aimed to perform lateral movement in restricted environments
Virtual training environment to learn web app ethical hacking.