Tool to simulate attacks and collect the data
A tool that allows you to create vulnerable environments
This is a multi-use bash script for Linux systems
The OWASP ZAP core project
Shows how easy it would be to gain unauthorized access to a system
In-depth attack surface mapping and asset discovery
A free and open source interactive HTTPS proxy
Command line tool and library for transferring data with URLs
Visual inspection tool for .dsk Spectrum/Amstrad disk images
Automatic SQL injection and database takeover tool
Powerful and flexible HTTP reverse proxy
The browser exploitation framework project
game of active directory
All-in-one OSINT tool for analysing any website
Automatic SSRF fuzzer and exploitation tool
Lightweight service virtualization/ API simulation / API mocking tool
mitmproxy implemented with golang
Multi-cloud security auditing tool
DARKLINGS is an accessible F2P 2D fighting game with periodic updates
A utility to safely generate malicious network traffic patterns
Qiling Advanced Binary Emulation Framework
RDP monster-in-the-middle (mitm) and library for Python
A tool that lets you execute commands on a server
Kubernetes Goat is a "Vulnerable by Design" cluster environment
Infection Monkey is a automated security testing tool for networks