pentesteracademy / patoolkit
PA Toolkit is a collection of traffic analysis plugins focused on security
☆432Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for patoolkit
- Easy files and payloads delivery over DNS☆416Updated 7 months ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆243Updated 3 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 2 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆718Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆474Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆687Updated 4 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆393Updated last year
- Reverse Shell Cheat Sheet TooL☆289Updated 4 years ago
- Elemental - An ATT&CK Threat Library☆314Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆530Updated 2 years ago
- Windows Pentest Scripts☆226Updated 6 years ago
- Digital forensic acquisition tool for Windows based incident response.☆334Updated 6 months ago
- Detecting ATT&CK techniques & tactics for Linux☆256Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- ☆332Updated last year
- Linux post exploitation enumeration and exploit checking tools☆176Updated 4 years ago
- Automated Tactics Techniques & Procedures☆251Updated last year
- Endpoint detection & Malware analysis software☆226Updated 4 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆373Updated 4 years ago
- A WebSocket C2 Tool☆387Updated 6 years ago
- ☆279Updated 6 years ago
- ☆371Updated last month
- Search Exploitable Software on Linux☆222Updated last year
- Test Blue Team detections without running any attack.☆271Updated 6 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,122Updated 3 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆444Updated 2 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆433Updated 2 years ago
- Network Pivoting Toolkit☆435Updated last year
- A fully functional DanderSpritz lab in 2 commands☆419Updated 5 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 5 years ago