This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
☆492Nov 21, 2019Updated 6 years ago
Alternatives and similar repositories for physical-docs
Users that are interested in physical-docs are comparing it to the libraries listed below
Sorting:
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆604Mar 2, 2021Updated 4 years ago
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,307Jan 31, 2022Updated 4 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,803Updated this week
- NTLMv1 Multitool☆659Nov 30, 2025Updated 3 months ago
- A toolkit to attack Office365☆1,117Nov 6, 2020Updated 5 years ago
- Issues to consider when planning a red team exercise.☆616Aug 23, 2017Updated 8 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆165Jul 30, 2023Updated 2 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,077Mar 19, 2024Updated last year
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,372Feb 10, 2026Updated 2 weeks ago
- Domain Password Audit Tool for Pentesters☆1,024Dec 24, 2025Updated 2 months ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 6 months ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆501Nov 17, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,802Sep 17, 2024Updated last year
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 2 months ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,494Sep 22, 2024Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,620Jul 18, 2024Updated last year
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆576Jan 22, 2020Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago