A generic, spec-compliant, thorough implementation of the OAuth
The AWS exploitation framework, designed for testing security
Web application fuzzer
Full-featured C2 framework which silently persists on webserver
Phishing Campaign Toolkit
two factor authentication management system