Full-featured C2 framework which silently persists on webserver
A post exploitation framework designed to operate covertly
American fuzzy lop - a security-oriented fuzzer
A powerful MongoDB auditing and pentesting tool
Cryptographic currency implementing Ouroboros PoS protocol
Exploitation Framework for Embedded Devices
A repository of LIVE malwares for malware analysis and security
A Social Media Encryption/Decryption Tool
CLI random password generator
Automatic SQL Injection Exploitation Tool
Command line client interface for LOGalyze 4