2. WsuspiciousWSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
3. Csp AuditorBurp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website
5. PywsusStandalone implementation of a part of the WSUS spec. Built for offensive security purposes.
7. MalboxesBuilds malware analysis Windows VMs so that you don't have to.
8. PyrdpRDP man-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
9. Dtd FinderList DTDs and generate XXE payloads using those local DTDs.
11. Cisco2CheckpointTool that assists in migrating firewall rules from Cisco to Checkpoint. Will optimize rules for you (rationalization, reuse merging, etc.).
15. break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
16. ysoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.