The Leading Security Assessment Framework for Android
The AWS exploitation framework, designed for testing security
Automating Host Exploitation with AI
Linux/Windows post-exploitation framework made by linux user
Post-exploitation tool to cover your tracks on a compromised machine
It's easy to use android botnet work without port forwarding
Python implementation of global optimization with gaussian processes
An advanced, yet simple, tunneling/pivoting tool
Merlin is a cross-platform post-exploitation HTTP/2 Command
C2 framework used to aid red teamers with post-exploitation
Make security testing of K8s, Docker, and Containerd easier
Kubernetes Goat is a "Vulnerable by Design" cluster environment
Vulnerable implementation of Facebook's GraphQL technology
Tiny and obfuscated ASP.NET webshell for C# web applications
A C2 post-exploitation framework
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
An Open Source Project | Since 2013 | SANS SIFT Automation | Hash Sets
Ubuntu Mate Hacking Distro
ED
Symbolic execution tool
ReShade is a generic post-processing injector for games and videos.
BlackBuntu Linux
Fancy reverse and bind shell handler
Cover your tracks during Linux Exploitation by leaving zero traces
The browser exploitation framework project