pentesteracademy / patoolkitLinks
PA Toolkit is a collection of traffic analysis plugins focused on security
☆435Updated 6 years ago
Alternatives and similar repositories for patoolkit
Users that are interested in patoolkit are comparing it to the libraries listed below
Sorting:
- Easy files and payloads delivery over DNS☆424Updated last month
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- Elemental - An ATT&CK Threat Library☆320Updated 3 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 4 years ago
- Endpoint detection & Malware analysis software☆229Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆529Updated 5 years ago
- ☆334Updated 3 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Updated 3 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- Automated Tactics Techniques & Procedures☆260Updated 2 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Updated 4 years ago
- Metasploitable3 CTF Write-up☆40Updated 8 years ago
- DejaVU - Open Source Deception Framework☆424Updated 6 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Updated 6 years ago
- Freedom Fighting Mode: open source hacking harness☆345Updated last year
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- First IDE for Nmap Script (NSE) Development.☆358Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 3 years ago
- Search an exploit in the local exploitdb database by its CVE☆171Updated 3 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- A code demonstrating CVE-2018-0886☆269Updated 5 years ago
- A WebSocket C2 Tool☆410Updated 8 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆371Updated 6 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 8 years ago
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago