PA Toolkit is a collection of traffic analysis plugins focused on security
☆435Oct 29, 2019Updated 6 years ago
Alternatives and similar repositories for patoolkit
Users that are interested in patoolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilities for Sysmon☆1,638Apr 4, 2026Updated last month
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,273Sep 4, 2022Updated 3 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HackBar plugin for Burpsuite☆1,618Apr 15, 2021Updated 5 years ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,323Aug 19, 2019Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Dec 24, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆23Oct 14, 2013Updated 12 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,121Apr 2, 2026Updated last month
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,581Oct 16, 2025Updated 6 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- A Tool for Domain Flyovers☆5,930May 22, 2022Updated 3 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,239Dec 27, 2023Updated 2 years ago
- ☆1,093May 1, 2019Updated 7 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆171Feb 19, 2025Updated last year
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,338Dec 6, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- Utilities for MITRE™ ATT&CK☆1,051Jan 3, 2026Updated 4 months ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Mar 19, 2019Updated 7 years ago
- PowerShell Pass The Hash Utils☆1,756Dec 9, 2018Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,016Jul 3, 2018Updated 7 years ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Penetration Testing Platform☆1,349Jul 6, 2022Updated 3 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆792Apr 29, 2026Updated last week
- 🕳 godoh - A DNS-over-HTTPS C2☆808Dec 19, 2023Updated 2 years ago