prism-net-recon: A script that prompts for an IP/Range and runs a "safe" default Nmap scan, outputting the results directly to a markdown file in a ~/Notes/Targets directory.prism-vpn-quick: A TUI to quickly switch between OpenVPN or WireGuard profiles specifically for HTB (HackTheBox) or TryHackMe environments.prism-listener: A tool that asks for a port and instantly spawns a netcat or pwncat listener in a floating terminal, pre-configured with the correct window class for easy monitoring.prism-target-set: The "Global variable" script. You input an IP or Domain, and the script saves it to /tmp/prism_target. Every other pentest script then uses this value as the default.prism-port-scan: A guided nmap wizard. It asks for the scan intensity (Stealth, Fast, Full) and automatically targets the IP set in prism-target-set.prism-shell-gen: A "Reverse Shell" generator. Choose your language (Python, Bash, PHP, Perl), enter your IP/Port, and it copies the payload to your clipboard instantly.prism-hash-id: A TUI wrapper for hash-identifier. Paste a hash, and it tells you if it’s MD5, SHA-256, or Bcrypt, then offers to launch a wordlist attack.prism-listener: Quickly spawns a netcat or pwncat listener on a specified port in a floating terminal, pre-configured with the correct window class so it doesn't get buried.