Skip to content
View Real-Fruit-Snacks's full-sized avatar

Block or report Real-Fruit-Snacks

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Real-Fruit-Snacks/README.md
Real-Fruit-Snacks

Important

Water-themed offensive security toolkit. 40+ projects spanning C2 frameworks, network tunneling, encrypted shells, AD enumeration, web tooling, and learning environments. Mixed-stack — heavyweight Rust/Go frameworks alongside hand-rolled assembly implants — bound by a shared Catppuccin aesthetic and brutalist branding.

A pantry of real, authentic offensive tooling — no hollow snacks, no corporate filler. Each release is its own discrete drop in the bucket; together they form the watershed.


§1 / Premise

Real-Fruit-Snacks is a personal offensive-security toolkit maintained as ~40 independent GitHub repositories under a single org umbrella. Every project is field-built for authorized red team engagements, pentests, and security research — not academic exercises.

The toolkit spans the full operator workflow: payload delivery, C2, post-exploitation, lateral movement, AD enumeration, credential abuse, surgical log surgery, and reference environments for the lab. Each tool ships standalone — no shared runtime, no monorepo lock-in. Pick what you need.

A water naming theme runs throughout — kraken, flood, siphon, aquifer, droplet, whirlpool, deluge — alongside a sail-themed sextet of multi-call binaries (mainsail, staysail, jib, moonraker, topsail, rill) that demonstrate the same idea built six different ways across six languages.

Authorization Required: Every tool is designed exclusively for authorized security testing with explicit written permission.


§2 / Highlights

KEY VALUE
TOOLS 40+ projects across 8 functional categories
LANGUAGES 11 stacks — Rust · Go · Python · C · x86 ASM · JS · TS · Lua · Zig · Shell · HTML
C2 5 frameworks — Kraken · Aquifer · Siphon · Wellspring · Spillway
TUNNELING 7 tools — Flux · Neap · Undertow · Slipstream · Conduit · Culvert · Depth
IMPLANTS 5 shells — Vapor · Grotto · Dew · Droplet · Undercurrent — assembly to C
ENUM 9 tools — Abyss · Flood · Riptide · Runoff · Maelstrom · Rapids · Lure · Seep · Whirlpool
AESTHETIC Catppuccin Mocha + Latte with brutalist 800×200 SVG banners
LICENSE MIT for most projects · GPLv3 for SSH-derived · CC-BY for notes

Browse the full catalog at real-fruit-snacks.github.io.


§3 / Catalog

C2 & Post-Exploitation

Tool What It Does Language
Kraken OPSEC-first C2 — X25519 ECDH, AES-256-GCM, modular implant with runtime-loadable modules, mesh networking, multi-transport (HTTP/HTTPS/TCP/SMB/DNS), BOF compatibility Rust
Aquifer Linux post-exploitation — kernel namespace isolation, multi-channel C2, polymorphic beacons, 36 stealth modules Go
Siphon Lightweight C2 — ECDH P-256 forward secrecy, AES-256-GCM transport, uTLS Chrome fingerprinting Go
Wellspring Payload delivery server — 12 delivery methods, token-gated access, AES-256-GCM at rest, memory zeroing. Single binary. Go
Spillway Reverse/bind/dormant FUSE mount — browse remote filesystems locally over TLS 1.3 with mutual PSK auth Go

Network & Tunneling

Tool What It Does Language
Flux Swiss Army Netcat — replaces nc/ncat/socat/pwncat. TLS + Noise encryption, auto-PTY shells, file transfer with SHA256, SOCKS5 pivoting, TCP scanning. Single static binary. Rust
Neap Static SSH server — reverse/bind shells with full PTY, SFTP, local/remote/dynamic port forwarding, TLS with SNI spoofing Rust
Undertow Static SSH server — reverse/bind shells, SFTP, port forwarding, TLS wrapping with SNI spoofing. Under 1.5 MB. Go
Slipstream Drop-in SSH wrapper — tunnel management, file transfers, passive filesystem mapping, per-command logging, fingerprint identity Rust
Conduit SOCAT relay with kernel-level process masquerading — prctl/setproctitle stealth, argument hiding, 50+ channel types C
Culvert Pivot under the obstruction — one-command ligolo-ng tunnel setup with TUN, routing, magic 240/4 localhost CIDR, and WebUI Shell
Depth Full SSH-2.0 in pure assembly — ChaCha20-Poly1305, Ed25519, X25519, SFTP, PTY, port forwarding. 94 KB static ELF, no libc. x86 ASM

Shells & Implants

Tool What It Does Language
Vapor Encrypted reverse shell + process injector in pure x86_64 NASM — ChaCha20-Poly1305 AEAD, Hell's Gate syscalls, zero deps x86 ASM
Grotto Encrypted netcat in pure assembly — ChaCha20-Poly1305, Linux ELF + Windows PE, ~8 KB, zero dependencies x86 ASM
Dew HTTPS reverse shell — XChaCha20-Poly1305 over TLS, ~37 KB binary, zero dependencies C
Droplet HTTPS reverse shell for Windows — ~50 KB C implant, AES-256 encryption, interactive Python listener C
Undercurrent io_uring stealth loader in pure assembly — ChaCha20-Poly1305, ~4.2 KB, invisible to syscall monitoring x86 ASM

Enumeration & Exploitation

Tool What It Does Language
Abyss Offensive forensic analysis — credentials, keys, persistence from disk/memory images. SAM, NTDS.dit, LSA, DPAPI, browser passwords, SSH keys, LSASS minidumps. Raw/E01/VMDK with NTFS/ext4. Rust
Flood Async web fuzzer — directory enum, VHost discovery, parameter fuzzing. Recursive scanning, clusterbomb mode, auto-throttle on 429s, JSON/CSV/Hashcat output. Rust
Riptide Collaborative browser terminal — real-time sync, credential vault, variable substitution, session recording, playbook workspace JavaScript
Runoff AD security audit — extract quick wins, attack paths, and misconfigurations from BloodHound CE Python
Maelstrom NetExec wrapper — 35+ AD enumeration modules in one command, multi-target scanning, actionable recommendations Python
Rapids Credential spraying framework — 28 native protocol modules, adaptive skipping, pass-the-hash support Python
Lure SMB hash bait — drops poisoned .url/.scf/.xml payloads on writable shares to coerce NTLM auth via Responder Python
Seep Windows privesc enumeration — 16 checks, 97 tools, MITRE ATT&CK mapping, fileless agent, single-file HTML reports Python
Whirlpool Privesc reasoning engine — parses LinPEAS/WinPEAS output, generates ranked exploitation playbooks Python
Eddy Surgical log entry removal — wtmp/btmp/utmp, lastlog, journal, Windows EVTX, pacct. Find-then-clean with timestamp preservation. Go
Deluge Nmap & RustScan parser — color-coded terminal reports, multi-format export, interactive scanning, Catppuccin styling Python

Reference & Environments

Tool What It Does Language
Shallows Browser-native Linux terminals — x86 emulation in the browser. No servers, no installs, no accounts. JavaScript
Ripple Browser-based Vim editor — full keybindings via CodeMirror 6, split panes, tabs, virtual filesystem, zero dependencies JavaScript
Surge Markdown-to-command-reference — fuzzy search, variable substitution, offline-first PWA, Catppuccin themes Python
Fathom Offline man pages browser — TLDR summaries, instant search, Catppuccin themes. PWA, works without internet. JavaScript
Cascade Native markdown editor — real-time collaboration, live preview, wiki-links, canvas whiteboard, 21+ themes. Tauri + Rust. TypeScript
Sunken-Archive Personal knowledge base — digital garden with interconnected notes, graph view, full-text search. Built on Quartz. TypeScript
HydroShot Screenshot capture & annotation — region select, drawing tools, copy/save. Built with Rust, winit, tiny-skia. Rust
Tidepool Interactive terminal portfolio — explore a developer profile through real shell commands in the browser via xterm.js JavaScript
Deadwater Research publication platform — index, search, and serve computational papers. Full-text search, citation graph, API. TypeScript
MyNotes Tradecraft notebook — personal pentester field reference. MkDocs Material with Catppuccin theming, deployed via GitHub Pages. Markdown
x86-assembly-lab Interactive x86 assembly lab — simulator, stack visualizer, register quiz, tutorials from fundamentals to reverse engineering HTML

AI & Enterprise

Tool What It Does Language
armsforge AI-powered security platform — intelligent automation, Claude Code integration, workflow orchestration for offensive operations TypeScript

Multi-Call Binaries

A sail-themed sextet — same idea (BusyBox-style single-binary shell toolkits), six different languages, six different size/portability tradeoffs.

Tool What It Does Language
Rill Pure x86_64 NASM — 41 Unix utilities, ~34 KB static ELF, direct syscalls, no libc x86 ASM
Staysail Zig — 84 Unix utilities, ~1 MB statically-linked, native cross-compile to Linux/macOS/Windows Zig
Moonraker Lua — 81 Unix utilities, ~1.2 MB static executable via luastatic with embedded Lua VM Lua
Jib Rust — 73 utilities + jq/http/dig, ~2.4 MB avg (1.4 MB slim → 3.7 MB full) across 11 platform builds Rust
Topsail Go — single-file binary, ~3.4 MB per platform (Linux/macOS/Windows × amd64/arm64), .deb/.rpm/.apk packages Go
Mainsail Python — 73 utilities, ~5.5 MB native bundles (or ~110 KB .pyz with system Python), Linux/Windows/macOS Python

Utilities

Tool What It Does Language
Tidemark Obsidian plugin — variable substitution in markdown via YAML frontmatter. Copy, replace, rename in one command. TypeScript

Games

Tool What It Does Language
Blueprint Browser-based incremental factory game — build, automate, prestige, publish. Zero-dependency vanilla HTML/CSS/JS. JavaScript
Crownfall Pixel-art medieval wave-defense incremental built as a single HTML file. Hold the wall, bank Crowns, return stronger. HTML
Tower-Defense Cyberpunk neon tower defense — 6 elements, 14 towers, procedural campaign, endless mode, roguelite unlocks. Phaser 3 + TypeScript + Vite. TypeScript

§4 / Stack

Layer Implementation
Systems Rust (memory-safe, ergonomic) · Go (single static binary) · C (footprint-critical)
Assembly x86_64 NASM (zero-libc, direct syscall, ELF + PE)
Scripting Python 3.10+ (AD tooling, parsers, frameworks) · Bash (orchestration)
Web TypeScript + Vite · Vanilla JavaScript · Tauri (native shell)
Niche Lua (luastatic) · Zig (cross-compile native)
Branding Catppuccin Mocha (dark) + Latte (light) · brutalist 800×200 SVG banners · Inter + JetBrains Mono
Docs Each repo ships a GitHub Pages site under docs/ matching the brutalist template
CI GitHub Actions across the org — build matrix, test, release artifacts, Pages deploy

§5 / Authorization

Every tool in this org is designed for authorized security testing with explicit written permission. Targeting systems you do not own or have not been contracted to test is illegal in most jurisdictions and never the intent of this work.

Security vulnerabilities should be reported via the affected project's private security advisories — never public issues. Each repo links its own advisories page.

The Real-Fruit-Snacks org does not: distribute pre-compiled malicious binaries, host live command infrastructure, package payloads for distribution, or provide operational support for unauthorized engagements.


All projects · Org GitHub · MIT (most), GPLv3 (SSH-derived), CC-BY (notes)

Popular repositories Loading

  1. Riptide Riptide Public

    Collaborative browser-based terminal and playbook workspace for penetration testing, CTF competitions, and red team operations — real-time sync, credential vault, variable substitution, output pars…

    JavaScript 4 1

  2. Siphon Siphon Public

    Lightweight C2 framework for red team operations — ECDH P-256 forward secrecy, AES-256-GCM encryption, uTLS Chrome fingerprinting

    Go 4 1

  3. Whirlpool Whirlpool Public

    Privilege escalation reasoning engine — parses LinPEAS/WinPEAS output and generates ranked exploitation playbooks

    Python 2

  4. Aquifer Aquifer Public

    Linux post-exploitation framework using kernel namespace isolation — multi-channel C2 with polymorphic beacons and 36 stealth modules

    Go 2 1

  5. Culvert Culvert Public

    Pivot under the obstruction — one-command ligolo-ng tunnel setup. Auto-downloads binaries, configures TUN, guides routing.

    Shell 1

  6. Deluge Deluge Public

    Advanced parser and formatter for Nmap and RustScan outputs — color-coded terminal reports, multi-format exports, interactive scanning with Catppuccin styling

    Python 1