Heres another bunch of links from my evernote, same reason applies for this post, since limits on whats accessible, I place em here. https://github.com/cobbr/Covenant https://medium.com/@LucaBongiorni/weaponizing-usb-gadgets-with-hid-devices-the-revenge-of-p4wnp1-a5615e909677 https://github.com/fireeye/commando-vm https://amp.kitploit.com/2019/02/volatility-workbench-gui-for-volatility.html?amp=1&m=1 https://github.com/Neo23x0/signature-base/tree/master/yara https://www.nextron-systems.com/spark-core/ https://github.com/Neo23x0/Loki https://www.nextron-systems.com/yara-rule-feed/ https://github.com/Neo23x0/sigma/blob/master/README.md https://amp.kitploit.com/2019/03/cat-nip-automated-basic-pentest-tool.html?amp=1&m=1 https://blog.zsec.uk/nmap-rtfm/amp/?__twitter_impression=true https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/amp/?__twitter_impression=true https://amp.kitploit.com/2019/03/fir-fast-incident-response.html?amp=1&m=1 https://github.com/bitsadmin/wesng https://www.kitploit.com/2019/03/h2t-scans-website-and-suggests-security.html?m=1 https://www.peerlyst.com/posts/resource-a-compendium-of-sites-that-you-can-practice-on-you-can-legally-hack-these-sites-karl-m-1 https://doublepulsar.com/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6 https://github.com/mitre-attack/car/tree/master/implementations/bzar https://www.slideshare.net/mobile/bartblaze/malware-analysis-threat-intelligence-and-reverse-engineering 1 https://blog.redxorblue.com/2019/04/sharpexec-lateral-movement-with-your.html?m=12 https://github.com/anthemtotheego/SharpExec https://www.kitploit.com/2019/04/darksplitz-exploit-framework.html?m=1 http://blog.frizk.net/2019/02/remote-live-memory-analysis-with-memory.html?m=1 https://velociraptor-docs-staging.velocidex.com https://www.kitploit.com/2019/04/powershellarsenal-powershell-module.htmlhttps://www.kitploit.com/2019/04/chaos-framework-v20-generate-payloads.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+PentestTools+(PenTest+Tools)&m=1 https://www.kitploit.com/2018/07/eagleeye-stalk-your-friends-find-their.html?m=1 https://www.kitploit.com/2019/04/pocsuite3-open-sourced-remote.html?utm_source=dlvr.it&utm_medium=twitter&m=1 https://www.kitploit.com/2019/04/isf-industrial-control-system.html?m=1 https://github.com/olafhartong/ATTACKdatamap