A free and open-source man-in-the-middle attack framework. Evilginx can be used to steal users’ login credentials and session cookies, allowing the tool to bypass two-factor authentication.
A free and open-source wireless and ethernet phishing tool. Ghost Phisher supports features such as webpage hosting, credential logging, Wi-Fi access point emulation, session hijacking, and more.
All paths lead to clouds. GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls.
A free and open-source phishing toolkit for organizations. GoPhish can run on Windows, macOS, and Linux and lets users quickly and easily spin up phishing attacks.
A free and open-source command-line packet crafting and analysis tool. The hping3 tool can send custom ICMP/UDP/TCP packets for use cases such as testing firewalls or network performance.
A free and open-source parallelized network login cracker tool. Hydra can crack dozens of protocols, including Cisco, HTTP(S), ICQ, IMAP, MySQL, Oracle, SMTP, and more.
Generalized automation / orchestration framework. It simplifies the development of IoT (Internet of Things) applications by providing a flow-based development environment. Users create flows by connecting nodes that represent different functionalities, making it easy to design and deploy applications that integrate various devices and services. It’s often used for rapid prototyping, automation, and IoT solutions.
A free and open-source password cracker tool for auditing and recovery. John the Ripper supports hundreds of hash and cipher types, including Unix, Windows, macOS, WordPress, database servers, filesystems, archives, and more.