jimmythompson / ent
An attack tree generator built on electron
☆62Updated 8 years ago
Alternatives and similar repositories for ent:
Users that are interested in ent are comparing it to the libraries listed below
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- Threat Specification Language☆28Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- ☆44Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Misc resources and documents on my security research☆21Updated 8 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- ☆26Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆38Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated 10 months ago
- ☆13Updated 7 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- INACTIVE - Security Testing Tool☆107Updated 9 years ago
- ☆27Updated 7 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated last month
- ☆29Updated 8 years ago