Shows how easy it would be to gain unauthorized access to a system
Linux/Windows post-exploitation framework made by linux user
The AWS exploitation framework, designed for testing security
C2 shellcode generator/compiler/handler
A Portable Penetration Testing Distribution for Windows
Framework that allows the user to take advantage of implementations
A small, simple PHP MVC framework skeleton that encapsulates a lot of
thad0ctor's BT5 toolkit streamlines word list creation and other tasks