PA Toolkit is a collection of traffic analysis plugins focused on security
☆435Oct 29, 2019Updated 6 years ago
Alternatives and similar repositories for patoolkit
Users that are interested in patoolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utilities for Sysmon☆1,577Sep 21, 2025Updated 6 months ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,272Sep 4, 2022Updated 3 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,340Dec 13, 2022Updated 3 years ago
- HackBar plugin for Burpsuite☆1,619Apr 15, 2021Updated 4 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,308Aug 19, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,094Dec 9, 2025Updated 3 months ago
- ☆23Oct 14, 2013Updated 12 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,546Oct 16, 2025Updated 5 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,235Dec 27, 2023Updated 2 years ago
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆171Feb 19, 2025Updated last year
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated 2 months ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PowerShell Pass The Hash Utils☆1,732Dec 9, 2018Updated 7 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,014Jul 3, 2018Updated 7 years ago
- Tool to deploy a post-exploitation prompt at any time☆321May 28, 2021Updated 4 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆786Jun 23, 2022Updated 3 years ago
- Penetration Testing Platform☆1,349Jul 6, 2022Updated 3 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆805Dec 19, 2023Updated 2 years ago