pentesteracademy / patoolkitLinks
PA Toolkit is a collection of traffic analysis plugins focused on security
☆435Updated 6 years ago
Alternatives and similar repositories for patoolkit
Users that are interested in patoolkit are comparing it to the libraries listed below
Sorting:
- Easy files and payloads delivery over DNS☆424Updated last month
- Elemental - An ATT&CK Threat Library☆320Updated 3 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- ☆334Updated 3 years ago
- Automated Tactics Techniques & Procedures☆260Updated 2 years ago
- Endpoint detection & Malware analysis software☆229Updated 6 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Updated 3 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 4 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Updated 6 years ago
- A WebSocket C2 Tool☆410Updated 8 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆529Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Updated 4 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- DejaVU - Open Source Deception Framework☆424Updated 6 months ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆173Updated 11 months ago
- Freedom Fighting Mode: open source hacking harness☆345Updated last year
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- First IDE for Nmap Script (NSE) Development.☆358Updated 5 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 3 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 6 years ago
- APT34/OILRIG leak☆232Updated 6 years ago