Pentester Automation Tool
☆46Jan 1, 2021Updated 5 years ago
Alternatives and similar repositories for pat
Users that are interested in pat are comparing it to the libraries listed below
Sorting:
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- OVAL Documentation☆15Aug 4, 2017Updated 8 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated last month
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Open Source software from The MITRE Corporation☆25Jun 4, 2024Updated last year
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- AngularJS interface and simple Node.js REST api for testing Powershell command execution; built on top of powershell-command-executor and…☆30Feb 23, 2015Updated 11 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Jun 3, 2016Updated 9 years ago
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Created to simplify interactions with virtual machines☆83Mar 3, 2025Updated last year
- ☆31May 24, 2019Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115May 27, 2017Updated 8 years ago
- All Things Python☆10Nov 25, 2021Updated 4 years ago
- A PowerShell tool for taking screenshots of multiple web servers quickly.☆94Apr 19, 2017Updated 8 years ago
- A client compatible with Metasploit's staging protocol☆264Aug 21, 2017Updated 8 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- Example showcasing prometheus monitoring with BIGIP using Telemetry Streaming and Container Ingress Services in Kubernetes 1.18☆18Jun 3, 2021Updated 4 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Dec 7, 2017Updated 8 years ago
- Mass Triage Tools☆20Mar 10, 2026Updated last week
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- Kali Linux Docker Container with the kali-linux-all Metapackage☆11Sep 12, 2016Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago