Project Address
Project Introduction
This project integrates excellent attack and defense weapon tools from the entire network, including automated exploitation, subdomain and directory scanning, port scanning, and other information gathering tools. It also includes exploit tools for major middleware and CMS vulnerabilities, brute force tools, lateral movement and evasion within internal networks, social engineering and phishing, as well as emergency response materials.
Directory
Note: The tools are only for security research and learning purposes. If the tools are used for other purposes, the user assumes all legal and joint responsibilities. The author and publisher do not assume any legal or joint responsibilities.