trustedsec / physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
☆478Updated 5 years ago
Alternatives and similar repositories for physical-docs
Users that are interested in physical-docs are comparing it to the libraries listed below
Sorting:
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,012Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆631Updated 3 years ago
- Learning Shodan through katas☆466Updated 4 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- ☆199Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- A mostly-serverless distributed hash cracking platform☆806Updated last year
- ☆230Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,274Updated 3 months ago
- Password spraying using AWS Lambda for IP rotation☆626Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆448Updated 3 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,124Updated 5 months ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- Issues to consider when planning a red team exercise.☆618Updated 7 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 5 years ago
- Modern tactical exploitation toolkit.☆848Updated 10 months ago
- Domain Password Audit Tool for Pentesters☆956Updated 2 years ago
- LinkedIn reconnaissance tool☆52Updated 3 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆695Updated 8 months ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated 10 months ago
- An archive of everything related to OSCP☆620Updated 4 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 5 months ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 7 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆749Updated 7 months ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆249Updated 2 years ago
- Blue Team Scripts☆248Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year