Use This Prefix If You're Sharing Tools Used for Exploiting Security Vulnerabilities to Gain Unauthorized Access.
This Prefix Contains Tools That Are Used for Offensive Security Purposes, Such as Red Teaming, Penetration Testing, or Simulating Cyber Attacks.