pentesteracademy / patoolkit
PA Toolkit is a collection of traffic analysis plugins focused on security
☆433Updated 5 years ago
Alternatives and similar repositories for patoolkit:
Users that are interested in patoolkit are comparing it to the libraries listed below
- Information released publicly by NCC Group's Cyber Incident Response Team☆477Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆720Updated 5 years ago
- Easy files and payloads delivery over DNS☆420Updated 10 months ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆401Updated last year
- Test Blue Team detections without running any attack.☆272Updated 9 months ago
- ☆332Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆377Updated 4 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆465Updated 3 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆631Updated 7 years ago
- Digital forensic acquisition tool for Windows based incident response.☆337Updated 9 months ago
- Reverse Shell Cheat Sheet TooL☆291Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆460Updated last year
- Elemental - An ATT&CK Threat Library☆317Updated 2 years ago
- Search Exploitable Software on Linux☆226Updated last year
- Active Directory forensic framework☆323Updated 2 years ago
- Automated Tactics Techniques & Procedures☆252Updated last year
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆350Updated 6 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Weaponizing Splunk with reverse and bind shells.☆176Updated 7 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆449Updated 2 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆169Updated this week
- ☆282Updated 7 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆530Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago