Easy to use cryptographic framework for data protection
Linux/Windows post-exploitation framework made by linux user
Security auditing tool for Linux, macOS, and UNIX-based system
Tool to simulate attacks and collect the data
An advanced, yet simple, tunneling/pivoting tool
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Merlin is a cross-platform post-exploitation HTTP/2 Command
Intelligently block brute-force attacks by aggregating system logs
jSQL Injection is a Java application for automatic SQL database injec
It's easy to use android botnet work without port forwarding
Automating Host Exploitation with AI
A C2 post-exploitation framework
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
A Python Package for Data Exfiltration
C2/post-exploitation framework
zynix-Fusion is a framework for hacking
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
A tool to dump the login password from the current linux user
Network Pivoting Toolkit
Multi hash crack suite
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Prediction of proteinfolding in 2D HP model