Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.
☆88Jan 25, 2026Updated last month
Alternatives and similar repositories for Physical-Pentesting-Tools
Users that are interested in Physical-Pentesting-Tools are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated last month
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆51Jan 25, 2026Updated last month
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆56Jan 25, 2026Updated last month
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆58Mar 31, 2025Updated 11 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆236Jan 25, 2026Updated last month
- ☆11Dec 28, 2025Updated 2 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Sep 29, 2025Updated 5 months ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- ☆20Feb 14, 2026Updated 2 weeks ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆15Aug 12, 2024Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆31Aug 2, 2025Updated 7 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated 11 months ago
- ☆16Aug 2, 2025Updated 7 months ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- 🕵️ Email osint tool☆64Aug 23, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- A School And Course Management System Build With Django☆14Jun 12, 2021Updated 4 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆422Jan 25, 2022Updated 4 years ago
- map and spoof remoteid coordinates☆12Feb 15, 2026Updated 2 weeks ago
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 8 months ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆51Jul 8, 2025Updated 7 months ago
- Inti easter challenge poc☆18May 4, 2021Updated 4 years ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 8 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆210Mar 22, 2025Updated 11 months ago
- ExpFuzz字典☆21May 27, 2024Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year