ll3N1GmAll / ATAT
Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.
☆34Updated last year
Alternatives and similar repositories for ATAT:
Users that are interested in ATAT are comparing it to the libraries listed below
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- ☆13Updated 7 years ago
- ☆34Updated 3 weeks ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆15Updated 2 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Custom pentesting tools☆24Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- Software exploitation training material☆15Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago