evildaemond / physsec-methodologyLinks
A public, open source physical security methodology
☆46Updated last year
Alternatives and similar repositories for physsec-methodology
Users that are interested in physsec-methodology are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆77Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆120Updated 2 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆53Updated 6 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Custom queries list for BloodHound☆29Updated 3 weeks ago
- Efflanrs - GUI for Snaffler Output☆27Updated 10 months ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆39Updated 3 weeks ago
- LinkedIn recon the easy way☆97Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 8 months ago
- A community-driven collection of BloodHound queries☆111Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆58Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 4 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆58Updated last month
- pysnaffler☆100Updated 3 weeks ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆46Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- A Red Team Activity Hub☆217Updated 2 weeks ago
- Malware As A Service☆134Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago