Search Results for "log"
Sort By:
The AWS exploitation framework, designed for testing security
Full-featured C2 framework which silently persists on webserver
A push-button wireless hacking and Man-in-the-Middle attack toolkit
A web crawler oriented to information security.