Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
It is a free, open-source penetration testing tool. It is designed specifically for testing web applications and is both flexible and extensible. | Advanced stealth web data collection framework for security - xsser01/phantomcollect |
Open source;
Cross platform (it even runs on a Raspberry Pi!);
Easy to install (using a multi-platform installer builder);
Completely free (no paid for 'Pro' version);
Ease of use a priority;
Comprehensive help pages;
Fully internationalized | Browser fingerprinting collection, GPS and IP geolocation detection, Stealth data gathering, Device hardware profiling, Network information collection, Educational security tool, Open source Python framework, Real-time data logging |
Statistics | |
Stacks 81 | Stacks 0 |
Followers 45 | Followers 1 |
Votes 0 | Votes 1 |

An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

At its core, Vulseek combines automated asset discovery and scanning with intelligent risk prioritization, allowing security teams to focus on what truly matters. Its customizable dashboards, real-time alerts, and integrations with popular ticketing systems and SIEMs help ensure vulnerabilities are addressed swiftly and systematically.

It is a penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process. It is built on top of ChatGPT and operates in an interactive mode to guide penetration testers in both overall progress and specific operations.

It is a compliance-focused pentesting-as-a-service platform. It allows companies to easily schedule and manage penetration tests, designed for both compliance and security enhancement.

It is an open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to set up proxies and interceptors to manage the traffic transmitted between client and server.