Make a system look as if it was hit by an APT.
Tools that exploit
Trigger known vulnerabilities or weaknesses to gain access.
76 tools indexed
Image-scaling attacks for multi-modal LLMs.
Small, portable ATT&CK detection tests.
BYOB
—Build Your Own Botnet (research).
Kill protected EDR processes.
Bluetooth Low Energy swiss-army knife.
Active Directory Certificate Services attack tool.
OS command-injection exploitation.
Docker enumeration + container escape.
Position-independent .NET shellcode loader.
Android security testing framework.
WiFi + Bluetooth offensive toolkit on ESP32.
Affordable WiFi hacking on ESP8266.
Post-exploitation framework.
Reverse-proxy phishing for MFA bypass.
Official firmware for the Flipper Zero.
Dynamic instrumentation for app analysis.
GEF
—GDB Enhanced Features.
Security advisories + PoCs from Google.
Generate gopher:// SSRF payloads.
Open-source phishing toolkit.
Microsoft Graph post-exploitation toolset.
Modern, malleable C2 framework.
Python toolkit for Windows protocols.