C2 framework used to aid red teamers with post-exploitation
A tool to check web apps for vulnerabilty
Windows memory hacking library
Awesome cloud enumerator
A post exploitation framework designed to operate covertly
Perform advanced MiTM attacks on websites with ease
an extremely buggy web app !
Testing for XSS via IPTC metadata
Code to brute force the 32-bit key used to RC4 encrypt .pwl files.