An attack tree generator built on electron
☆62May 23, 2016Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below
Sorting:
- ☆54Nov 15, 2017Updated 8 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- ⚙️ 🦀 🕹️ Rewrite of the GB emulator☆18Feb 11, 2023Updated 3 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- A framework-independent asset pipeline that takes the pain out of preprocessing JavaScript, CSS and associated files☆24Dec 4, 2025Updated 3 months ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Log4Shell CVE-2021-44228 mitigation tester☆16Dec 13, 2021Updated 4 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- A developer-friendly, modular library for all core cryptographic operations written using Java.☆23Oct 31, 2022Updated 3 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆165Mar 14, 2023Updated 2 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Oct 21, 2021Updated 4 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- ☆35Jul 17, 2023Updated 2 years ago
- ☆43Oct 27, 2022Updated 3 years ago
- ☆35Jan 4, 2026Updated 2 months ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- ☆11Jan 5, 2023Updated 3 years ago
- Reliable Keycloak user migration at scale. Features include bounded concurrency, durable retries, and zero data loss.☆31Jan 13, 2026Updated last month
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Plants Vs Zombies 2 Version 3.8.1 - In Game Menu + 11☆10Aug 28, 2015Updated 10 years ago
- This controller manages Keycloak clients and realms over Kubernetes resources.☆35Jan 2, 2024Updated 2 years ago