The AWS exploitation framework, designed for testing security
Automating Host Exploitation with AI
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
Toolkit aimed to perform lateral movement in restricted environments
Network Pivoting Toolkit
Information Gathering and Network Exploitation Framework
Post-Exploitation Framework