Automating Host Exploitation with AI
A Python Package for Data Exfiltration
C2/post-exploitation framework
C2 shellcode generator/compiler/handler
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
Network Pivoting Toolkit