pentesteracademy / patoolkit
PA Toolkit is a collection of traffic analysis plugins focused on security
☆432Updated 5 years ago
Alternatives and similar repositories for patoolkit:
Users that are interested in patoolkit are comparing it to the libraries listed below
- Easy files and payloads delivery over DNS☆422Updated last year
- A WebSocket C2 Tool☆393Updated 7 years ago
- Digital forensic acquisition tool for Windows based incident response.☆338Updated 11 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- Active Directory forensic framework☆323Updated 3 years ago
- ☆334Updated 2 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,127Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 2 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆404Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆444Updated 2 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆426Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆236Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Updated 7 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆245Updated 8 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Tool Analysis Result Sheet☆348Updated 7 years ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆450Updated 9 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago
- Network Pivoting Toolkit☆442Updated last year
- The Old BloodHound C# Ingestor (Deprecated)☆513Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago