Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152
☆23Jan 1, 2023Updated 3 years ago
Alternatives and similar repositories for Physical-PenTest-Methodology
Users that are interested in Physical-PenTest-Methodology are comparing it to the libraries listed below
Sorting:
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- ☆20May 18, 2022Updated 3 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- ULPatch is open source user space live patch tool.☆14Jan 11, 2026Updated 2 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Every Nuclei template that has ever appeared on Github☆36Jun 2, 2022Updated 3 years ago
- Malware Analysis Tools☆32Oct 26, 2019Updated 6 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- ☆76Aug 19, 2021Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- ☆18May 11, 2021Updated 4 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- Collaboration platform for reverse engineering tools.☆46Dec 20, 2024Updated last year
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Java decompilation & deobfuscation lab - dockerized toolset☆15Mar 1, 2026Updated last week
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated last month
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 5 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 3 months ago
- ☆11May 30, 2021Updated 4 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- The SOLVE-IT knowledge base for digital forensics☆62Mar 6, 2026Updated last week