A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing.

This documentation covers the basics of operation and deployment, accessing the Linux shell for advanced operations, Internet connectivity, software updates and payload development.

}}

Getting Started

Beginner Guides

Software Updates

Writing Payloads

Managing Payloads

Troubleshooting

Tips & Tricks

Product Information