Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.
☆34Dec 4, 2023Updated 2 years ago
Alternatives and similar repositories for ATAT
Users that are interested in ATAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- A Malduino compatible USB Rubber Ducky payload to enable RDP, disable/cripple defender, disable AMSI, and execute a self healing and rebo…☆13Dec 14, 2020Updated 5 years ago
- Various useful scripts/payloads for the MalduinoW☆23Feb 26, 2021Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Python-Based Pentesting Framework☆30Dec 7, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆49Sep 20, 2019Updated 6 years ago
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Re-key Salt masters and minions☆11May 14, 2020Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 months ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- SqlMap_BurpSuite☆50Aug 15, 2019Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago