A tool that allows you to create vulnerable environments
A free and open source interactive HTTPS proxy
A collection of Python classes for working with network protocols
Server for security audits supporting public key authentication
Utilize all available CPU cores for accepting new client connections
Automatic SQL injection and database takeover tool
RDP monster-in-the-middle (mitm) and library for Python
A tool to check web apps for vulnerabilty
Powerful framework for rogue access point attack
Automating Host Exploitation with AI
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
powerful and useful hacker dictionary builder for a brute-force attack
MitM pentesting opensource toolkit
Framework for Man-In-The-Middle attacks
Perform automated MITM (Man In The Middle) attacks.
Virtual Machine Image To Test Penetration Skills
A push-button wireless hacking and Man-in-the-Middle attack toolkit