evildaemond / physsec-methodology
A public, open source physical security methodology
β44Updated 10 months ago
Alternatives and similar repositories for physsec-methodology:
Users that are interested in physsec-methodology are comparing it to the libraries listed below
- Network penetration testing toolset wrapperβ81Updated 2 years ago
- π©οΈ Collection of BloodHound queries for Azureβ57Updated last month
- β51Updated last month
- linikatz is a tool to attack AD on UNIXβ142Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkitβ143Updated 2 months ago
- β53Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypassβ70Updated last year
- A tool for quickly evaluating IAM permissions in AWS.β57Updated last year
- Efflanrs - GUI for Snaffler Outputβ24Updated 5 months ago
- Artifact monitoring that ensures fairplayβ75Updated 3 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ87Updated last year
- β54Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD πβ90Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β52Updated this week
- Custom queries list for BloodHoundβ23Updated 5 months ago
- Parses Snaffler output file and generate beautified outputs.β71Updated 3 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-factoβ¦β35Updated 9 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.β20Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advβ¦β109Updated 3 months ago
- β33Updated 2 months ago
- Various AD tools needed for penetration testing in one place.β24Updated last year
- Malware As A Serviceβ130Updated 11 months ago
- Next generation fireprox AWS API endpoint creation utility.β49Updated 2 years ago
- A collection of tools that I use in CTF's or for assessmentsβ89Updated 2 weeks ago
- β34Updated 3 years ago
- Generate graphs and charts based on password cracking resultβ156Updated 2 years ago
- bowing to the AI Overlords.β19Updated 2 months ago