Pentester Automation Tool
☆46Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for pat
Users that are interested in pat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate HTTPS reports based on scan data☆15Mar 30, 2026Updated last week
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- A command line remote for a Roku media box.☆17Apr 10, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Mar 26, 2026Updated 2 weeks ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Open Source software from The MITRE Corporation☆25Jun 4, 2024Updated last year
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Jun 3, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Created to simplify interactions with virtual machines☆84Mar 3, 2025Updated last year
- ☆31May 24, 2019Updated 6 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- ☆10Oct 11, 2021Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Rex library for dealing with Powershell Scripts☆53Aug 4, 2025Updated 8 months ago
- ☆21Jul 15, 2016Updated 9 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115May 27, 2017Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- A client compatible with Metasploit's staging protocol☆263Aug 21, 2017Updated 8 years ago
- Dr. Jekyll's Themes - Static Website Theme Directory☆15Aug 27, 2023Updated 2 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- Example showcasing prometheus monitoring with BIGIP using Telemetry Streaming and Container Ingress Services in Kubernetes 1.18☆18Jun 3, 2021Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- Define an errata in table format (CSV) and then apply it to an arbitrary source. Inspired by RFC Errata, lets you keep your own errata in…☆21Aug 24, 2015Updated 10 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago