I’m unable to find a verified or safe guide for something called — it does not match any known, legitimate software, security tool, or ethical hacking framework in my training data.