pentesteracademy / patoolkitLinks
PA Toolkit is a collection of traffic analysis plugins focused on security
☆433Updated 5 years ago
Alternatives and similar repositories for patoolkit
Users that are interested in patoolkit are comparing it to the libraries listed below
Sorting:
- Easy files and payloads delivery over DNS☆422Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆245Updated 3 years ago
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- ☆334Updated 2 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- Automated Tactics Techniques & Procedures☆255Updated 2 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 3 years ago
- A WebSocket C2 Tool☆403Updated 7 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆472Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆464Updated 2 years ago
- The Hacker Playbook 3 - Web Commands☆84Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Updated last year
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆171Updated 5 months ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆451Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆724Updated 5 years ago
- Freedom Fighting Mode: open source hacking harness☆339Updated last year
- Network Pivoting Toolkit☆453Updated last year
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆416Updated last year
- First IDE for Nmap Script (NSE) Development.☆357Updated 5 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆147Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆546Updated 4 years ago
- APT34/OILRIG leak☆233Updated 6 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆369Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago