The AWS exploitation framework, designed for testing security
Automating Host Exploitation with AI
A Python Package for Data Exfiltration
C2/post-exploitation framework
Full-featured C2 framework which silently persists on webserver
Toolkit aimed to perform lateral movement in restricted environments
Network Pivoting Toolkit
Information Gathering and Network Exploitation Framework
Post-Exploitation Framework