Hyperion - Runtime encryptor for 32-bit portable executables ("PE.
CarbonCopy - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.
AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
kalitorify - Transparent proxy through Tor for Kali Linux OS.
dos-over-tor - Proof of concept denial of service over Tor stress test tool.
Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
Tails - Live operating system aiming to preserve your privacy and anonymity.
OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
Nipe - Script to redirect all traffic from the machine to the Tor network.
What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
Metadata Anonymization Toolkit (MAT) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.
Fing - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.
SHELLSHOCK LIVE RULER OVERLAY ANDROID
cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
Web-accessible source code ripping tools.
Web path discovery and bruteforcing tools.
Web application and resource analysis tools.
Proxies and Machine-in-the-Middle (MITM) Tools.
Network Traffic Replay and Editing Tools.
Intentionally Vulnerable Systems as Docker Containers.
This project is supported by Netsparker Web Application Security Scanner This work is licensed under a Creative Commons Attribution 4.0 International License. Please check the Contributing Guidelines for more details. Your contributions and suggestions are heartily♥ welcome. Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities. A collection of awesome penetration testing and offensive cybersecurity resources.