An attack tree generator built on electron
☆62May 23, 2016Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful SQL queries for Nexpose☆19Jul 4, 2017Updated 8 years ago
- custom nexpose sql export queries☆17Apr 26, 2017Updated 8 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- Windows Privesc Check☆19May 20, 2014Updated 11 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆21May 27, 2025Updated 10 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Compare the anime lists of hummingbird.me users☆10Jun 29, 2015Updated 10 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- IriusRisk Community☆72Sep 5, 2023Updated 2 years ago
- XBMC Video Addons☆19Dec 19, 2015Updated 10 years ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆30Dec 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Alice Margatroid, a dollmaster that pretends not to be a doll itself.☆18Nov 4, 2017Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- framework for a high interaction SSH honeypot☆39Apr 8, 2020Updated 6 years ago
- UDP Traffic Obfuscator☆10Jun 18, 2014Updated 11 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Library and applications for interfacing with eidc32 and intelli-m☆13Oct 18, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13May 30, 2017Updated 8 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- Application Security Automation☆527Sep 5, 2023Updated 2 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- CVE-2021-2109 && Weblogic Server RCE via JNDI☆31Jan 22, 2021Updated 5 years ago
- ☆27Feb 19, 2026Updated 2 months ago
- A documentation generator for NASL.☆19May 31, 2022Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Oct 21, 2021Updated 4 years ago
- ☆12May 10, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Maven Infrastructure using Docker☆16Apr 8, 2026Updated last week
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- The Little Library is an open source app that allows you to upload, store, and share creative commons licensed content across computers a…☆16Mar 25, 2013Updated 13 years ago
- A module that allows you to proxy a single hypercore replication stream to multiple peers☆21Jul 5, 2018Updated 7 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated 2 months ago