jimmythompson / entLinks
An attack tree generator built on electron
☆62Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below
Sorting:
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 8 months ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆281Updated 7 years ago
- Content for OWASP Summit 2017 site☆129Updated 5 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆58Updated 7 years ago
- Privacy Cards for Software Developers☆54Updated 6 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 9 years ago
- Misc resources and documents on my security research☆21Updated 9 years ago
- SWAMP-in-a-Box☆62Updated 5 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆39Updated 9 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- Mobile Incident Response Book☆61Updated 9 years ago
- A Java library for parsing and programmatically using threat models☆82Updated 2 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 7 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- ☆198Updated 10 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- ☆68Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- NIST/NCCoE Mobile Threat Catalogue☆150Updated 5 months ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- ☆14Updated 8 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆142Updated last year
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Updated 8 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- Store Burp data and collaborate via git☆53Updated 6 years ago