A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Here you can share your experience with the project you are suggesting or its comparison with PowerHub. Optional.
A valid email to send you a verification link when necessary or log in.