A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Easy to use cryptographic framework for data protection
An advanced, yet simple, tunneling/pivoting tool
Linux/Windows post-exploitation framework made by linux user
Automating Host Exploitation with AI
It's easy to use android botnet work without port forwarding
Security auditing tool for Linux, macOS, and UNIX-based system
Merlin is a cross-platform post-exploitation HTTP/2 Command
A C2 post-exploitation framework
jSQL Injection is a Java application for automatic SQL database injec
Intelligently block brute-force attacks by aggregating system logs
Linux simplified. A consumer-friendly distro, based on Debian Stable
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
zynix-Fusion is a framework for hacking
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
A tool to dump the login password from the current linux user
Network Pivoting Toolkit
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Multi hash crack suite
Prediction of proteinfolding in 2D HP model