A public, open source physical security methodology
☆47Apr 2, 2024Updated last year
Alternatives and similar repositories for physsec-methodology
Users that are interested in physsec-methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Feb 1, 2025Updated last year
- ☆53Jun 28, 2025Updated 8 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- An Open-Source Door Simulator for RFID/PACS Training☆137Nov 11, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆31Jan 22, 2026Updated 2 months ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Oct 18, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- adws enumeration bof☆169Feb 16, 2026Updated last month
- ☆18Feb 29, 2024Updated 2 years ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago
- A reference of the different types of access control card readers and which countries they're commonly found in☆18Oct 19, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni …☆18Jun 1, 2024Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Nov 29, 2024Updated last year
- really ?☆12Feb 29, 2024Updated 2 years ago
- ☆44Jun 1, 2025Updated 9 months ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆39Feb 26, 2025Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- mfkeys is tool to extract keys from Mifare classic cards☆11Mar 28, 2013Updated 12 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- ☆100Sep 1, 2024Updated last year
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Research on the Gallagher / Cardax access control system☆67Jan 9, 2020Updated 6 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago