Utilize all available CPU cores for accepting new client connections
A tool to check web apps for vulnerabilty
C2/post-exploitation framework
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
Network Pivoting Toolkit
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack