Available Commands:
- help - Show available commands
- malware - Learn about Malware
- dos - Learn about Denial-of-Service Attacks
- phishing - Learn about Phishing
- spoofing - Learn about Spoofing
- identity-based - Learn about Identity-Based Attacks
- code-injection - Learn about Code Injection Attacks
- supply-chain - Learn about Supply Chain Attacks
- social-engineering - Learn about Social Engineering Attacks
- insider-threats - Learn about Insider Threats
- dns-tunneling - Learn about DNS Tunneling
- iot-attacks - Learn about IoT-Based Attacks
- ai-powered - Learn about AI-Powered Attacks
- exit - Exit the application
- Ctrl + C - Stop running command