Flipper Zero Unleashed Firmware
Shows how easy it would be to gain unauthorized access to a system
C2 framework used to aid red teamers with post-exploitation
Klotsky class block slider puzzles.
Windows memory hacking library
A post exploitation framework designed to operate covertly
SSH man-in-the-middle tool
C++ library for easy simulations on any CUDA/AMP/CPU or remote PC
Security (Hack) Application
Word List Generator for Windows
Code to brute force the 32-bit key used to RC4 encrypt .pwl files.