jimmythompson / entLinks
An attack tree generator built on electron
☆62Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below
Sorting:
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 5 months ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- ☆26Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- A Java library for parsing and programmatically using threat models☆81Updated 2 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- Misc resources and documents on my security research☆21Updated 8 years ago
- Continuous Integration and Development ExploiteR☆87Updated 2 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Store Burp data and collaborate via git☆53Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- ☆78Updated 10 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 13 years ago
- ☆11Updated 9 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- ☆198Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆96Updated 7 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago