This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
☆493Nov 21, 2019Updated 6 years ago
Alternatives and similar repositories for physical-docs
Users that are interested in physical-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,315Jan 31, 2022Updated 4 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Find vulnerabilities in AD Group Policy☆640Mar 25, 2022Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,818Updated this week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- Issues to consider when planning a red team exercise.☆613Aug 23, 2017Updated 8 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,502Sep 22, 2024Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆502Nov 17, 2022Updated 3 years ago
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,217Aug 7, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- NTLMv1 Multitool☆662Mar 12, 2026Updated last month
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,082Mar 19, 2024Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆165Jul 30, 2023Updated 2 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Apr 6, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,626Dec 13, 2025Updated 4 months ago
- ☆60Mar 28, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Domain Password Audit Tool for Pentesters☆1,028Dec 24, 2025Updated 3 months ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated 2 months ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 6 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,263Aug 24, 2022Updated 3 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆578Jul 3, 2025Updated 9 months ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆574Jan 22, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- gather gather gather☆584Mar 15, 2025Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- This project is just a dumping ground for random scripts I've developed.☆138Aug 14, 2024Updated last year