The first messaging platform operating without user identifiers
C2 framework used to aid red teamers with post-exploitation
Security tools that can be used to audit SIP based VoIP systems
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Advanced Network Packet Generator
Perform advanced MiTM attacks on websites with ease