Pentester Automation Tool
☆46Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for pat
Users that are interested in pat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 8, 2020Updated 6 years ago
- A command line remote for a Roku media box.☆17Apr 10, 2015Updated 11 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automated pshtt, trustymail, and sslyze scanning☆30Apr 24, 2026Updated last week
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Open Source software from The MITRE Corporation☆26Apr 14, 2026Updated 2 weeks ago
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- AngularJS interface and simple Node.js REST api for testing Powershell command execution; built on top of powershell-command-executor and…☆30Feb 23, 2015Updated 11 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Jun 3, 2016Updated 9 years ago
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Created to simplify interactions with virtual machines☆84Mar 3, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆31May 24, 2019Updated 6 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 4 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- A PowerShell tool for taking screenshots of multiple web servers quickly.☆94Apr 19, 2017Updated 9 years ago
- FLUXION☆10Jun 24, 2016Updated 9 years ago
- A client compatible with Metasploit's staging protocol☆264Aug 21, 2017Updated 8 years ago
- Example showcasing integration with BIGIP using Container Ingress on Kubernetes 1.19☆11Sep 8, 2022Updated 3 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆16Apr 13, 2015Updated 11 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Dec 7, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mass Triage Tools☆20Mar 10, 2026Updated last month
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆115Jan 13, 2017Updated 9 years ago
- Simple backdoor written in .bat for windows that use NetCat☆17Aug 6, 2016Updated 9 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179May 23, 2016Updated 9 years ago
- Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and c…☆43Oct 2, 2013Updated 12 years ago