evildaemond / physsec-methodology
A public, open source physical security methodology
☆46Updated last year
Alternatives and similar repositories for physsec-methodology:
Users that are interested in physsec-methodology are comparing it to the libraries listed below
- ☆55Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 5 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆36Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- ☆53Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆109Updated last week
- bowing to the AI Overlords.☆23Updated 4 months ago
- Custom queries list for BloodHound☆28Updated 8 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Updated 8 months ago
- 🌩️ Collection of BloodHound queries for Azure☆64Updated 4 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆103Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- LDAP Enumeration Tool for Pentesters☆44Updated 2 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆69Updated last month
- Malware As A Service☆132Updated last year
- ☆35Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆64Updated 5 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Artifact monitoring that ensures fairplay☆75Updated 3 months ago
- ☆55Updated last year
- ☆47Updated last week
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆139Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- Azure Post Exploitation Framework☆197Updated 2 months ago