Automating Host Exploitation with AI
C2/post-exploitation framework
Full-featured C2 framework which silently persists on webserver
WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack
A Framework for Comparing Password Guessing Strategies
msfvenom shellcode generator/compiler/listenner
two factor authentication management system
Python-based reverse-engineering tool
Set limits on per-day total usage for Linux/Unix users