Linux/Windows post-exploitation framework made by linux user
Web application fuzzer
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks
C2 framework used to aid red teamers with post-exploitation
The browser exploitation framework project
Easy to use cryptographic framework for data protection
CTFs as you need them
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
The AWS exploitation framework, designed for testing security
Powerful framework for rogue access point attack
🚀 Professional Social Dating Web App Builder (formerly pH7CMS)
Command & Control-Framework created for collaboration in python3
Automating Host Exploitation with AI
A C2 post-exploitation framework
Tiny and obfuscated ASP.NET webshell for C# web applications
C2/post-exploitation framework
zynix-Fusion is a framework for hacking
Sudomy is a subdomain enumeration tool to collect subdomains
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
WebSploit is a high level MITM Framework
Unlock Your ISP and access all your restricted websites
Offensive Web Testing Framework (OWTF), is a framework
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack