Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152
☆22Jan 1, 2023Updated 3 years ago
Alternatives and similar repositories for Physical-PenTest-Methodology
Users that are interested in Physical-PenTest-Methodology are comparing it to the libraries listed below
Sorting:
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated last month
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies☆19Jul 3, 2022Updated 3 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- ☆20May 18, 2022Updated 3 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Mar 19, 2025Updated 11 months ago
- ☆11Sep 15, 2024Updated last year
- Every Nuclei template that has ever appeared on Github☆36Jun 2, 2022Updated 3 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- Malware Analysis Tools☆32Oct 26, 2019Updated 6 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- ☆76Aug 19, 2021Updated 4 years ago
- ☆18May 11, 2021Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Java decompilation & deobfuscation lab - dockerized toolset☆15Feb 15, 2026Updated 2 weeks ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- Collaboration platform for reverse engineering tools.☆46Dec 20, 2024Updated last year
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- Python client for McAfee ePolicy Orchestrator