Take it like a gift

CTFd
CTFd

A Capture The Flag framework focusing on ease of use and customizability.

Ligolo-ng
Ligolo-ng

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Empire
Empire

Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.

Kadimus
Kadimus

Check for and exploit LFI vulnerabilities with a focus on PHP systems.

dnscat2
dnscat2

Create an encrypted command-and-control (C&C) channel over the DNS protocol.

cloudsploit
cloudsploit

Cloud Security Posture Management (CSPM).

Go365
Go365

Go365 performs user enumeration and password guessing attacks on organizations that use Office365.

espionage
espionage

Collects informations related to domains whois, history, dns records and more.

ExifTool
ExifTool

ExifTool meta information reader/writer.

jsfinder
jsfinder

Fetches JavaScript files quickly and comprehensively from a defined list of URLs or domains.

bbradar.io
bbradar.io

Fetches latest bug bounty programs from many platforms and consolidates them in one place.

jSQL Injection
jSQL Injection

Java application for automatic SQL database injection.

GitHacker
GitHacker

A Git source leak exploit tool that restores the entire Git repository, including data from stash.

favirecon
favirecon

Use favicon.ico to improve your target recon phase.

crawley
crawley

The unix-way web crawler.