A Genetic Algorithm for Reactors in StarMade
Encrypt and decrypt text using AES 256 bit encryption
A C2 post-exploitation framework
C2/post-exploitation framework
Brute force su testi crittografati con il cifrario di Cesare.
Defensive System Administrative Tools
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
A tool to dump the login password from the current linux user
Find web application vulnerabilities the easy way!