Powerful framework for rogue access point attack
Easy to use cryptographic framework for data protection
CTFs as you need them
The AWS exploitation framework, designed for testing security
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
C2 framework used to aid red teamers with post-exploitation
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Tiny and obfuscated ASP.NET webshell for C# web applications
The browser exploitation framework project
Sudomy is a subdomain enumeration tool to collect subdomains
A post exploitation framework designed to operate covertly
Offensive Web Testing Framework (OWTF), is a framework
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Offensive PowerShell for red team and penetration testing
A Framework for Comparing Password Guessing Strategies
Framework for Man-In-The-Middle attacks
msf post-exploitation auxiliary module
Open Source Penetration Testing / Ethical Hacking Framework
(Android Forensics & Malware Analysis Included)
Open Source API-centric PHP Micro-framework
Perform anonymous and non-anonymous pentesting.
Information Gathering and Network Exploitation Framework
Buffer Overflow Exploitation Framework