trustedsec / physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
☆475Updated 5 years ago
Alternatives and similar repositories for physical-docs:
Users that are interested in physical-docs are comparing it to the libraries listed below
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆690Updated 6 months ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆626Updated 3 years ago
- Password spraying using AWS Lambda for IP rotation☆598Updated 2 years ago
- A mostly-serverless distributed hash cracking platform☆803Updated 11 months ago
- ☆198Updated 3 years ago
- ☆230Updated 5 years ago
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,008Updated 4 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆744Updated 5 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆294Updated 5 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,263Updated last month
- Notes, Slides, Comments and Commands on How to Win CCDC☆131Updated last month
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆446Updated 3 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,161Updated 2 weeks ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆125Updated 5 years ago
- Learning Shodan through katas☆464Updated 4 years ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 7 months ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- Issues to consider when planning a red team exercise.☆614Updated 7 years ago
- Tools for hunting for threats.☆579Updated 4 months ago
- An archive of everything related to OSCP☆617Updated 4 years ago
- ☆99Updated 3 weeks ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆250Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Domain Password Audit Tool for Pentesters☆943Updated 2 years ago