jimmythompson / entView external linksLinks
An attack tree generator built on electron
☆62May 23, 2016Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below
Sorting:
- ☆53Nov 15, 2017Updated 8 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 7 months ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- A documentation generator for NASL.☆18May 31, 2022Updated 3 years ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- Useful SQL queries for Nexpose☆19Jul 4, 2017Updated 8 years ago
- Log4Shell CVE-2021-44228 mitigation tester☆16Dec 13, 2021Updated 4 years ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Nov 4, 2021Updated 4 years ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Dec 17, 2024Updated last year
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- A developer-friendly, modular library for all core cryptographic operations written using Java.☆23Oct 31, 2022Updated 3 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Oct 21, 2021Updated 4 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- framework for a high interaction SSH honeypot☆39Apr 8, 2020Updated 5 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago
- ☆35Jul 17, 2023Updated 2 years ago
- ☆35Jan 4, 2026Updated last month
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 8 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- Plants Vs Zombies 2 Version 3.8.1 - In Game Menu + 11☆10Aug 28, 2015Updated 10 years ago