Security auditing tool for Linux, macOS, and UNIX-based system
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
It's easy to use android botnet work without port forwarding
An advanced, yet simple, tunneling/pivoting tool
Tool to simulate attacks and collect the data
Merlin is a cross-platform post-exploitation HTTP/2 Command
Linux/Windows post-exploitation framework made by linux user
Easy to use cryptographic framework for data protection
Automating Host Exploitation with AI
A C2 post-exploitation framework
Intelligently block brute-force attacks by aggregating system logs
jSQL Injection is a Java application for automatic SQL database injec
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
zynix-Fusion is a framework for hacking
Toolkit aimed to perform lateral movement in restricted environments
A tool to dump the login password from the current linux user
Network Pivoting Toolkit
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
Multi hash crack suite
Prediction of proteinfolding in 2D HP model