The Linux version is no longer supported! The last Linux version is 6.0 that you find inside this repository.
The reason for this is that the Unbekannt Framework originally existed for Windows and Linux only supports a few features. Thats why I decided not to release new versions for Linux anymore.
It is strongly recommended to install the requirements for Unbekannt Framework. Some modules need third-party tools so you dont get errors inside the modules.
For more help read the help page inside the Unbekannt Framework by typing help
The modules:
Modules Description
——————— ———————————
module/network/ping ping an ip address to see if the host is up or down
module/network/looukp lookup an ip address to see geo location and more
module/network/scan scan an ip address to see all open ports
module/network/netscan scan an entire network for available ip and mac addresses
module/network/ddos ddos ip addresses or websites
module/network/lanc use lanc to sniffer/spoof your network
module/network/pcps use pcps to sniffrt/spoof your network (includes xbox and ps4)
module/tools/reverse_tcp setup reverse tcp shell or listen for incoming connections
module/tools/send_sms send an anonymous sms every 24 hours
module/tools/webkit ip and user-agent graber via url
module/tools/ssh_exec multiply command execution over ssh
module/exec/moba enhanced terminal for windows with x11 server, tabbed ssh client, network tools
module/exec/putty connect via ssh to server
module/exec/box privat tcp chat
The latest version (recommended):
Older versions:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…