trustedsec / physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
☆472Updated 5 years ago
Alternatives and similar repositories for physical-docs:
Users that are interested in physical-docs are comparing it to the libraries listed below
- ☆228Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,001Updated 4 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆800Updated 9 months ago
- ☆196Updated 3 years ago
- Password spraying using AWS Lambda for IP rotation☆582Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆624Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆124Updated 5 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆443Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 6 months ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆351Updated last year
- LinkedIn reconnaissance tool☆50Updated 3 years ago
- AI-based, context-driven network device ranking☆294Updated 11 months ago
- Issues to consider when planning a red team exercise.☆614Updated 7 years ago
- Domain Password Audit Tool for Pentesters☆934Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆592Updated 3 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆681Updated 4 months ago
- A collection of Red Team focused tools, scripts, and notes☆1,115Updated 2 months ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆299Updated 7 months ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- The Open-Source AWS Cyber Range☆479Updated 4 years ago
- Atomic Purple Team Framework and Lifecycle☆286Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,257Updated last week
- Brian's Pentesting and Technical Tips for You☆120Updated 5 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆289Updated 4 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆891Updated 3 years ago
- ☆99Updated 4 years ago