Automatic SQL injection and database takeover tool
A tool to check web apps for vulnerabilty
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
A push-button wireless hacking and Man-in-the-Middle attack toolkit