Easy to use cryptographic framework for data protection
Linux/Windows post-exploitation framework made by linux user
Tool to simulate attacks and collect the data
An advanced, yet simple, tunneling/pivoting tool
A lightweight and powerful iOS framework for intercepting HTTP/HTTPS
Merlin is a cross-platform post-exploitation HTTP/2 Command
Decode various cryptocurrency addresses
jSQL Injection is a Java application for automatic SQL database injec
It's easy to use android botnet work without port forwarding
Automating Host Exploitation with AI
A C2 post-exploitation framework
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
Hacking Chrome Saved Passwords
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
A tool to dump the login password from the current linux user
Network Pivoting Toolkit
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
swap_digger is a tool used to automate Linux swap analysis
A Framework for Comparing Password Guessing Strategies
Open Source Security tool to audit hashed passwords.