The browser exploitation framework project
C2 framework used to aid red teamers with post-exploitation
The AWS exploitation framework, designed for testing security
Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly