Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.
☆90Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for Physical-Pentesting-Tools
Users that are interested in Physical-Pentesting-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 5, 2026Updated last week
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated last year
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆15Aug 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆85Mar 31, 2025Updated last year
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆25Apr 3, 2026Updated last week
- ☆11Dec 28, 2025Updated 3 months ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆211Mar 22, 2025Updated last year
- ☆28Feb 23, 2023Updated 3 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆192Jul 30, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Sep 29, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 2, 2025Updated 8 months ago
- map and spoof remoteid coordinates☆22Mar 21, 2026Updated 3 weeks ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆105Nov 2, 2025Updated 5 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- ☆19Nov 28, 2024Updated last year
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 11 months ago
- A collection of TUBs (Totally Useless Bambdas) for Burp Suite, created by Tib3rius & friends.☆32Sep 18, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WiFi Geolocation Spoofing with the ESP8266☆80May 17, 2018Updated 7 years ago
- Making Maps for Investigators☆14Feb 13, 2026Updated 2 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,641Mar 1, 2026Updated last month
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆433Jan 25, 2022Updated 4 years ago
- ExpFuzz字典☆21May 27, 2024Updated last year