Take it like a gift

Evilginx3
featured
Evilginx3

Standalone MITM attack framework allowing for the bypass of 2-factor authentication.

ADAPE Script
ADAPE Script

Active Directory assessment and privilege escalation script.

DVWA
DVWA

Damn Vulnerable Web Application.

EagleEye
EagleEye

Stalk your friends on social media using image recognition and reverse image search.

PentesterLand
PentesterLand

Sharing knowledge that makes your life as bug hunters and pentesters easier.

secbutler
secbutler

The perfect butler for pentesters, bug-bounty hunters and security researchers.

DOMDig
DOMDig

DOM XSS scanner for Single Page Applications.

exiv2
exiv2

Image metadata library and tools.

sshLooterC
sshLooterC

It's the C version of sshLooter.

Jaeles
Jaeles

The Swiss Army knife for automated Web Application Testing

FOCA
FOCA

Tool to find metadata and hidden information in the documents.

ssh-auditor
ssh-auditor

The best way to scan for weak ssh passwords on your network.

Coercer
Coercer

Automatically coerce a Windows server to authenticate on an arbitrary machine.

ADReaper
ADReaper

Enumerate an Active Directory environment with LDAP queries.

NahamSec
NahamSec

NahamSec Twitch channel.