Offensive Web Testing Framework (OWTF), is an OWASP+PTES focused try to unite great tools and make pen testing more efficient, written mostly in Python @owtfp http://owtf.org
Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and assign an automated ranking for each finding.
A standalone app to monitor and control OWTF - written in Go.
HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)
OWTF Testing Framework
Docker repository for OWTF (64-bit Kali)
The passive online scanner makes OWTF passive testing through third party websites more accessible for everyone.
The bootstrap script for installation of OWTF
MOVED to owtf/owtf: The user documentation for OWTF which is written using sphinx
Consists of jar files needed for zest
Integration of Crawljax as a component in OWTF
A place for OWTF session recording, tracking, analysis and login script generator
Provides boilerplate vulnerability explanations and templates which can easily be used in real-world reports
When OWTF goes for restart
AJAX target crawler for use in pentesting.
Mobile app exploit payloads: Quick and dirty exploit PoC code to save time when demonstrating impact