an armarda of hacking tools for undetectable post exploitation and exploitation. all network traffic utilises cryptographic algorithms from the CNSA.
Warning this toolkit is still in development, and is currently not stable
a command and control framework, capable of generating payloads and stagers, and managing connections to other tools
a linux kernelspace rootkit with remote access